Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
plugmancrypted.exe

Overview

General Information

Sample name:plugmancrypted.exe
Analysis ID:1590146
MD5:8e9211eea2ba6f1b345b696b10f9518a
SHA1:0d2cb42cee5bc56d6a6fab077e950fefd0af9c43
SHA256:11a4eadb74837d9fdc0f052302016abed805674c458529523101ced2ccaf4346
Tags:exeuser-pr0xylife
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • plugmancrypted.exe (PID: 6888 cmdline: "C:\Users\user\Desktop\plugmancrypted.exe" MD5: 8E9211EEA2BA6F1B345B696B10F9518A)
    • plugmancrypted.exe (PID: 3196 cmdline: "C:\Users\user\Desktop\plugmancrypted.exe" MD5: 8E9211EEA2BA6F1B345B696B10F9518A)
      • plugmancrypted.exe (PID: 5024 cmdline: C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqw" MD5: 8E9211EEA2BA6F1B345B696B10F9518A)
      • plugmancrypted.exe (PID: 3992 cmdline: C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\bglg" MD5: 8E9211EEA2BA6F1B345B696B10F9518A)
      • plugmancrypted.exe (PID: 5704 cmdline: C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\diqzhgnu" MD5: 8E9211EEA2BA6F1B345B696B10F9518A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["www.kposlifestyle.design:2404:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-OH1QS4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "edefdefffff", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\edefdefffff\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c708:$a1: Remcos restarted by watchdog!
            • 0x6cc80:$a3: %02i:%02i:%02i:%03i
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            0.2.plugmancrypted.exe.470f440.4.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              0.2.plugmancrypted.exe.470f440.4.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                0.2.plugmancrypted.exe.470f440.4.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  0.2.plugmancrypted.exe.470f440.4.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x69308:$a1: Remcos restarted by watchdog!
                  • 0x69880:$a3: %02i:%02i:%02i:%03i
                  0.2.plugmancrypted.exe.470f440.4.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x63594:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x63510:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x63510:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x63a10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x64010:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x63604:$str_b2: Executing file:
                  • 0x6444c:$str_b3: GetDirectListeningPort
                  • 0x63e00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x63f80:$str_b7: \update.vbs
                  • 0x6362c:$str_b9: Downloaded file:
                  • 0x63618:$str_b10: Downloading file:
                  • 0x636bc:$str_b12: Failed to upload file:
                  • 0x64414:$str_b13: StartForward
                  • 0x64434:$str_b14: StopForward
                  • 0x63ed8:$str_b15: fso.DeleteFile "
                  • 0x63e6c:$str_b16: On Error Resume Next
                  • 0x63f08:$str_b17: fso.DeleteFolder "
                  • 0x636ac:$str_b18: Uploaded file:
                  • 0x6366c:$str_b19: Unable to delete:
                  • 0x63ea0:$str_b20: while fso.FileExists("
                  • 0x63b49:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 30 entries

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: FF 9B 7F 6B 43 9F 59 B3 6D 05 DF 5D E3 CC B8 8D 5A BA EE D8 03 9B 24 2E 1F DF A9 B5 66 7F D3 5D 66 C0 10 9A 22 4D 6E EA 6E FB 5A 68 AC F9 15 AF 28 3D 27 D2 47 CF 50 3D BC 0A 97 A0 9E 57 2B 83 7A AF 15 CA 72 DC AA 03 9C 2A D9 94 AE 08 66 EC 8E 06 DA 42 D8 90 34 63 9D B3 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\plugmancrypted.exe, ProcessId: 3196, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-OH1QS4\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-13T16:41:00.515575+010020327761Malware Command and Control Activity Detected192.168.2.649711154.216.16.382404TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-13T16:41:01.234575+010020327771Malware Command and Control Activity Detected154.216.16.382404192.168.2.649711TCP
                  2025-01-13T16:43:06.600028+010020327771Malware Command and Control Activity Detected154.216.16.382404192.168.2.649711TCP
                  2025-01-13T16:45:06.685521+010020327771Malware Command and Control Activity Detected154.216.16.382404192.168.2.649711TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-13T16:41:02.747408+010028033043Unknown Traffic192.168.2.649715178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: plugmancrypted.exeAvira: detected
                  Source: www.kposlifestyle.designAvira URL Cloud: Label: malware
                  Source: 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["www.kposlifestyle.design:2404:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-OH1QS4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "edefdefffff", "Keylog file max size": ""}
                  Source: plugmancrypted.exeVirustotal: Detection: 56%Perma Link
                  Source: plugmancrypted.exeReversingLabs: Detection: 57%
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: plugmancrypted.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00432B45 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_00432B45
                  Source: plugmancrypted.exe, 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_64030305-b

                  Exploits

                  barindex
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00406764 _wcslen,CoGetObject,2_2_00406764
                  Source: plugmancrypted.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: plugmancrypted.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: plugmancrypted.exe, 00000000.00000002.4579072454.0000000005F30000.00000004.08000000.00040000.00000000.sdmp, plugmancrypted.exe, 00000000.00000002.4575446262.0000000003451000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040B335
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040B53A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,2_2_0041B63A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0044D7F9 FindFirstFileExA,2_2_0044D7F9
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,2_2_004089A9
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00406AC2 FindFirstFileW,FindNextFileW,2_2_00406AC2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,2_2_00407A8C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,2_2_00408DA7
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00418E5F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_100010F1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_10006580 FindFirstFileExA,2_2_10006580
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00406F06
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Temp\bglgJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqwJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Temp\diqzhgnuJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Jump to behavior

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:49711 -> 154.216.16.38:2404
                  Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 154.216.16.38:2404 -> 192.168.2.6:49711
                  Source: Malware configuration extractorURLs: www.kposlifestyle.design
                  Source: global trafficTCP traffic: 192.168.2.6:49711 -> 154.216.16.38:2404
                  Source: global trafficTCP traffic: 192.168.2.6:58738 -> 162.159.36.2:53
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewIP Address: 154.216.16.38 154.216.16.38
                  Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49715 -> 178.237.33.50:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040455B WaitForSingleObject,SetEvent,recv,2_2_0040455B
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                  Source: plugmancrypted.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                  Source: plugmancrypted.exe, 00000005.00000002.2165681884.00000000031E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                  Source: plugmancrypted.exe, 00000005.00000002.2165681884.00000000031E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                  Source: plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                  Source: plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: www.kposlifestyle.design
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: plugmancrypted.exe, 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpPro
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSE;O
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpc
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpn.net/json.gpv
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0:
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0H
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0I
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0Q
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.msocsp.com0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://ocsp.msocsp.com0S
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: bhv78B2.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0~
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                  Source: plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                  Source: plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                  Source: plugmancrypted.exe, 00000005.00000002.2165059424.00000000012EF000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                  Source: plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                  Source: plugmancrypted.exeString found in binary or memory: https://login.yahoo.com/config/login
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://www.digicert.com/CPS0
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: plugmancrypted.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                  Source: bhv78B2.tmp.5.drString found in binary or memory: https://www.office.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000002_2_004099E4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\plugmancrypted.exeJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00415B5E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00415B5E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_0040987A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004098E2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_00406DFC
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_00406E9F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004068B5
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_004072B5
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00415B5E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,2_2_00409B10
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041BD82 SystemParametersInfoW,2_2_0041BD82

                  System Summary

                  barindex
                  Source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041742B GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,2_2_0041742B
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041AECC OpenProcess,NtSuspendProcess,CloseHandle,2_2_0041AECC
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041AEF8 OpenProcess,NtResumeProcess,CloseHandle,2_2_0041AEF8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00401806 NtdllDefWindowProc_W,5_2_00401806
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004018C0 NtdllDefWindowProc_W,5_2_004018C0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004016FD NtdllDefWindowProc_A,6_2_004016FD
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004017B7 NtdllDefWindowProc_A,6_2_004017B7
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00402CAC NtdllDefWindowProc_A,7_2_00402CAC
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00402D66 NtdllDefWindowProc_A,7_2_00402D66
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00415A51 ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_00415A51
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_0589D3040_2_0589D304
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059B65B00_2_059B65B0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059BAD600_2_059BAD60
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059BBF700_2_059BBF70
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059B00070_2_059B0007
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059B00400_2_059B0040
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059BBF600_2_059BBF60
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_097D96800_2_097D9680
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0043D04B2_2_0043D04B
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0042707E2_2_0042707E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041301D2_2_0041301D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004410302_2_00441030
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004531102_2_00453110
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004271B82_2_004271B8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041D27C2_2_0041D27C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004522E22_2_004522E2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0043D2A82_2_0043D2A8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004373602_2_00437360
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004363BA2_2_004363BA
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0042645F2_2_0042645F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004315822_2_00431582
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041E7EA2_2_0041E7EA
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0044C9492_2_0044C949
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004269D62_2_004269D6
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0043CBED2_2_0043CBED
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00432C542_2_00432C54
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0043CE1C2_2_0043CE1C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00434F322_2_00434F32
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_100171942_2_10017194
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_1000B5C12_2_1000B5C1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044B0405_2_0044B040
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0043610D5_2_0043610D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004473105_2_00447310
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044A4905_2_0044A490
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040755A5_2_0040755A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0043C5605_2_0043C560
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044B6105_2_0044B610
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044D6C05_2_0044D6C0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004476F05_2_004476F0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044B8705_2_0044B870
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044081D5_2_0044081D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004149575_2_00414957
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004079EE5_2_004079EE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00407AEB5_2_00407AEB
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044AA805_2_0044AA80
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00412AA95_2_00412AA9
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00404B745_2_00404B74
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00404B035_2_00404B03
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044BBD85_2_0044BBD8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00404BE55_2_00404BE5
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00404C765_2_00404C76
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00415CFE5_2_00415CFE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00416D725_2_00416D72
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00446D305_2_00446D30
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00446D8B5_2_00446D8B
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00406E8F5_2_00406E8F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004050386_2_00405038
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0041208C6_2_0041208C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004050A96_2_004050A9
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0040511A6_2_0040511A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0043C13A6_2_0043C13A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004051AB6_2_004051AB
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004493006_2_00449300
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0040D3226_2_0040D322
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0044A4F06_2_0044A4F0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0043A5AB6_2_0043A5AB
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004136316_2_00413631
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004466906_2_00446690
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0044A7306_2_0044A730
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004398D86_2_004398D8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_004498E06_2_004498E0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0044A8866_2_0044A886
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0043DA096_2_0043DA09
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00438D5E6_2_00438D5E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00449ED06_2_00449ED0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0041FE836_2_0041FE83
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00430F546_2_00430F54
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004050C27_2_004050C2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004014AB7_2_004014AB
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004051337_2_00405133
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004051A47_2_004051A4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004012467_2_00401246
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_0040CA467_2_0040CA46
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004052357_2_00405235
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004032C87_2_004032C8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004016897_2_00401689
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00402F607_2_00402F60
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 004169A7 appears 87 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 00433AB0 appears 41 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 004165FF appears 35 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 004341C0 appears 55 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 00422297 appears 42 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 00401F66 appears 50 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 004020E7 appears 40 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 0044DB70 appears 41 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 00444B5A appears 37 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 00413025 appears 79 times
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: String function: 00416760 appears 69 times
                  Source: plugmancrypted.exe, 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000000.00000002.4578413057.0000000005D50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000000.00000002.4572970774.000000000153E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000000.00000002.4579072454.0000000005F30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000000.00000002.4575446262.0000000003451000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000000.00000000.2118310684.0000000000EB2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFisa.exe* vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000002.00000002.4575023419.0000000003F42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000002.00000002.4574950004.0000000003EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs plugmancrypted.exe
                  Source: plugmancrypted.exeBinary or memory string: OriginalFileName vs plugmancrypted.exe
                  Source: plugmancrypted.exe, 00000007.00000002.2155957559.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs plugmancrypted.exe
                  Source: plugmancrypted.exeBinary or memory string: OriginalFilenameFisa.exe* vs plugmancrypted.exe
                  Source: plugmancrypted.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@9/4@2/2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,5_2_004182CE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00416C9D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_00416C9D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,7_2_00410DE1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,5_2_00418758
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040E2F1 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,2_2_0040E2F1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041A84A FindResourceA,LoadResource,LockResource,SizeofResource,2_2_0041A84A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00419DBA OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_00419DBA
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].jsonJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-OH1QS4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile created: C:\Users\user\AppData\Local\Temp\bhv78B2.tmpJump to behavior
                  Source: plugmancrypted.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: plugmancrypted.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSystem information queried: HandleInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000006.00000002.2155047902.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: plugmancrypted.exe, 00000005.00000002.2165716075.0000000003707000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: plugmancrypted.exe, plugmancrypted.exe, 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: plugmancrypted.exeVirustotal: Detection: 56%
                  Source: plugmancrypted.exeReversingLabs: Detection: 57%
                  Source: C:\Users\user\Desktop\plugmancrypted.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                  Source: unknownProcess created: C:\Users\user\Desktop\plugmancrypted.exe "C:\Users\user\Desktop\plugmancrypted.exe"
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe "C:\Users\user\Desktop\plugmancrypted.exe"
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqw"
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\bglg"
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\diqzhgnu"
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe "C:\Users\user\Desktop\plugmancrypted.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqw"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\bglg"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\diqzhgnu"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\Desktop\plugmancrypted.cfgJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: plugmancrypted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: plugmancrypted.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: plugmancrypted.exeStatic file information: File size 1187328 > 1048576
                  Source: plugmancrypted.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x121400
                  Source: plugmancrypted.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: plugmancrypted.exe, 00000000.00000002.4579072454.0000000005F30000.00000004.08000000.00040000.00000000.sdmp, plugmancrypted.exe, 00000000.00000002.4575446262.0000000003451000.00000004.00000800.00020000.00000000.sdmp
                  Source: plugmancrypted.exeStatic PE information: 0xF79C3086 [Tue Aug 23 02:46:30 2101 UTC]
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041BEEE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_059BB518 pushfd ; iretd 0_2_059BB521
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 0_2_097DA152 pushad ; iretd 0_2_097DA159
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004560BF push ecx; ret 2_2_004560D2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00434206 push ecx; ret 2_2_00434219
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0045C9DD push esi; ret 2_2_0045C9E6
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004569F0 push eax; ret 2_2_00456A0E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_10002806 push ecx; ret 2_2_10002819
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044693D push ecx; ret 5_2_0044694D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DB84
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DBAC
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00451D54 push eax; ret 5_2_00451D61
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0A4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0CC
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00451D34 push eax; ret 6_2_00451D41
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00444E71 push ecx; ret 6_2_00444E81
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00414060 push eax; ret 7_2_00414074
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00414060 push eax; ret 7_2_0041409C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00414039 push ecx; ret 7_2_00414049
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_004164EB push 0000006Ah; retf 7_2_004165C4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00416553 push 0000006Ah; retf 7_2_004165C4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00416555 push 0000006Ah; retf 7_2_004165C4
                  Source: plugmancrypted.exeStatic PE information: section name: .text entropy: 7.502376574673669
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00406128 ShellExecuteW,URLDownloadToFileW,2_2_00406128
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00419DBA OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_00419DBA
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041BEEE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040E627 Sleep,ExitProcess,2_2_0040E627
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMemory allocated: 3250000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMemory allocated: 3450000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMemory allocated: 3250000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_00419AB8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeWindow / User API: threadDelayed 3749Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeWindow / User API: threadDelayed 5748Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeWindow / User API: foregroundWindowGot 1771Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-53088
                  Source: C:\Users\user\Desktop\plugmancrypted.exeAPI coverage: 9.6 %
                  Source: C:\Users\user\Desktop\plugmancrypted.exe TID: 4052Thread sleep count: 241 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exe TID: 4052Thread sleep time: -120500s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exe TID: 7096Thread sleep count: 3749 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exe TID: 7096Thread sleep time: -11247000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exe TID: 7096Thread sleep count: 5748 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exe TID: 7096Thread sleep time: -17244000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040B335
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040B53A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,2_2_0041B63A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0044D7F9 FindFirstFileExA,2_2_0044D7F9
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,2_2_004089A9
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00406AC2 FindFirstFileW,FindNextFileW,2_2_00406AC2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,2_2_00407A8C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,2_2_00408DA7
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00418E5F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_100010F1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_10006580 FindFirstFileExA,2_2_10006580
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00406F06
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_00418981 memset,GetSystemInfo,5_2_00418981
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Temp\bglgJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqwJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Temp\diqzhgnuJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: plugmancrypted.exe, 00000002.00000002.4573781588.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573667166.0000000000CAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: bhv78B2.tmp.5.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                  Source: C:\Users\user\Desktop\plugmancrypted.exeAPI call chain: ExitProcess graph end nodegraph_2-54686
                  Source: C:\Users\user\Desktop\plugmancrypted.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0043A86D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043A86D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041BEEE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00442764 mov eax, dword ptr fs:[00000030h]2_2_00442764
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_10004AB4 mov eax, dword ptr fs:[00000030h]2_2_10004AB4
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00410BF1 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,2_2_00410BF1
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00434378 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00434378
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0043A86D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043A86D
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00433D4F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00433D4F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00433EE2 SetUnhandledExceptionFilter,2_2_00433EE2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_100060E2
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_10002639
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_10002B1C
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041742B GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,2_2_0041742B
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMemory written: C:\Users\user\Desktop\plugmancrypted.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: NULL target: C:\Users\user\Desktop\plugmancrypted.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: NULL target: C:\Users\user\Desktop\plugmancrypted.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeSection loaded: NULL target: C:\Users\user\Desktop\plugmancrypted.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe2_2_0041100E
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041894A mouse_event,2_2_0041894A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe "C:\Users\user\Desktop\plugmancrypted.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqw"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\bglg"Jump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeProcess created: C:\Users\user\Desktop\plugmancrypted.exe C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\diqzhgnu"Jump to behavior
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerData\Lo
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\56
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\tCa
                  Source: plugmancrypted.exe, 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\-
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerU
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4573375756.0000000000C63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: plugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerZ
                  Source: plugmancrypted.exe, 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, logs.dat.2.drBinary or memory string: [Program Manager]
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00434015 cpuid 2_2_00434015
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetLocaleInfoA,2_2_0040E751
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_0045107A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetLocaleInfoW,2_2_004512CA
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: EnumSystemLocalesW,2_2_004472BE
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_004513F3
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetLocaleInfoW,2_2_004514FA
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_004515C7
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: GetLocaleInfoW,2_2_004477A7
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_00450C8F
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: EnumSystemLocalesW,2_2_00450F52
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: EnumSystemLocalesW,2_2_00450F07
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: EnumSystemLocalesW,2_2_00450FED
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\Users\user\Desktop\plugmancrypted.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_00404915 GetLocalTime,CreateEventA,CreateThread,2_2_00404915
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0041A9AD GetComputerNameExW,GetUserNameW,2_2_0041A9AD
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 2_2_0044804A _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,2_2_0044804A
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: 5_2_0041739B GetVersionExW,5_2_0041739B
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0040B21B
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0040B335
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: \key3.db2_2_0040B335
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: ESMTPPassword6_2_004033F0
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword6_2_00402DB3
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword6_2_00402DB3
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 5024, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\Desktop\plugmancrypted.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-OH1QS4Jump to behavior
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.470f440.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.plugmancrypted.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.plugmancrypted.exe.4696e10.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 6888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: plugmancrypted.exe PID: 3196, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED
                  Source: C:\Users\user\Desktop\plugmancrypted.exeCode function: cmd.exe2_2_00405042
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts12
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  Logon Script (Windows)1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  2
                  Credentials in Registry
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Windows Service
                  1
                  Software Packing
                  3
                  Credentials In Files
                  4
                  File and Directory Discovery
                  Distributed Component Object Model211
                  Input Capture
                  1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script322
                  Process Injection
                  1
                  Timestomp
                  LSA Secrets38
                  System Information Discovery
                  SSH3
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials31
                  Security Software Discovery
                  VNCGUI Input Capture12
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Bypass User Account Control
                  DCSync2
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Masquerading
                  Proc Filesystem4
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Access Token Manipulation
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd322
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590146 Sample: plugmancrypted.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 25 www.kposlifestyle.design 2->25 27 geoplugin.net 2->27 39 Suricata IDS alerts for network traffic 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 10 other signatures 2->45 8 plugmancrypted.exe 2 2->8         started        signatures3 process4 signatures5 47 Contains functionality to bypass UAC (CMSTPLUA) 8->47 49 Tries to steal Mail credentials (via file registry) 8->49 51 Contains functionalty to change the wallpaper 8->51 53 6 other signatures 8->53 11 plugmancrypted.exe 4 15 8->11         started        process6 dnsIp7 29 www.kposlifestyle.design 154.216.16.38, 2404, 49711, 49714 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 11->29 31 geoplugin.net 178.237.33.50, 49715, 80 ATOM86-ASATOM86NL Netherlands 11->31 23 C:\ProgramData\edefdefffff\logs.dat, data 11->23 dropped 55 Detected Remcos RAT 11->55 57 Maps a DLL or memory area into another process 11->57 59 Installs a global keyboard hook 11->59 16 plugmancrypted.exe 1 11->16         started        19 plugmancrypted.exe 1 11->19         started        21 plugmancrypted.exe 2 11->21         started        file8 signatures9 process10 signatures11 33 Tries to steal Instant Messenger accounts or passwords 16->33 35 Tries to harvest and steal browser information (history, passwords, etc) 16->35 37 Tries to steal Mail credentials (via file / registry access) 19->37

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  plugmancrypted.exe57%VirustotalBrowse
                  plugmancrypted.exe58%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                  plugmancrypted.exe100%AviraHEUR/AGEN.1309847
                  plugmancrypted.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  www.kposlifestyle.design100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  www.kposlifestyle.design
                  154.216.16.38
                  truetrue
                    unknown
                    geoplugin.net
                    178.237.33.50
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpfalse
                        high
                        www.kposlifestyle.designtrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.office.com/bhv78B2.tmp.5.drfalse
                          high
                          http://geoplugin.net/json.gpcplugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.imvu.comrplugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              https://aefd.nelreports.net/api/report?cat=bingthbhv78B2.tmp.5.drfalse
                                high
                                http://www.imvu.complugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://aefd.nelreports.net/api/report?cat=wsbbhv78B2.tmp.5.drfalse
                                    high
                                    http://www.nirsoft.netplugmancrypted.exe, 00000005.00000002.2165059424.00000000012EF000.00000004.00000010.00020000.00000000.sdmpfalse
                                      high
                                      https://aefd.nelreports.net/api/report?cat=bingaotakbhv78B2.tmp.5.drfalse
                                        high
                                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv78B2.tmp.5.drfalse
                                          high
                                          https://deff.nelreports.net/api/report?cat=msnbhv78B2.tmp.5.drfalse
                                            high
                                            http://geoplugin.net/json.gpn.net/json.gpvplugmancrypted.exe, 00000002.00000002.4573513004.0000000000C74000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.complugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                high
                                                https://www.google.complugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  http://geoplugin.net/json.gpSE;Oplugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhv78B2.tmp.5.drfalse
                                                      high
                                                      https://aefd.nelreports.net/api/report?cat=bingaotbhv78B2.tmp.5.drfalse
                                                        high
                                                        http://geoplugin.net/json.gp/Cplugmancrypted.exe, 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, plugmancrypted.exe, 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          high
                                                          https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv78B2.tmp.5.drfalse
                                                            high
                                                            http://geoplugin.net/json.gpProplugmancrypted.exe, 00000002.00000002.4573513004.0000000000C86000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://aefd.nelreports.net/api/report?cat=bingrmsbhv78B2.tmp.5.drfalse
                                                                high
                                                                https://www.google.com/accounts/serviceloginplugmancrypted.exefalse
                                                                  high
                                                                  https://login.yahoo.com/config/loginplugmancrypted.exefalse
                                                                    high
                                                                    http://www.nirsoft.net/plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      high
                                                                      https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv78B2.tmp.5.drfalse
                                                                        high
                                                                        http://www.ebuddy.complugmancrypted.exe, plugmancrypted.exe, 00000007.00000002.2155957559.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          178.237.33.50
                                                                          geoplugin.netNetherlands
                                                                          8455ATOM86-ASATOM86NLfalse
                                                                          154.216.16.38
                                                                          www.kposlifestyle.designSeychelles
                                                                          135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1590146
                                                                          Start date and time:2025-01-13 16:40:08 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 8m 12s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:10
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:plugmancrypted.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@9/4@2/2
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 99%
                                                                          • Number of executed functions: 181
                                                                          • Number of non-executed functions: 309
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 172.202.163.200
                                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                          TimeTypeDescription
                                                                          10:41:31API Interceptor8903857x Sleep call for process: plugmancrypted.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          178.237.33.50documents.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          c2.htaGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          c2.htaGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                          • geoplugin.net/json.gp
                                                                          preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                          • geoplugin.net/json.gp
                                                                          154.216.16.38debug.dbg.elfGet hashmaliciousMirai, OkiruBrowse
                                                                            zmap.arm.elfGet hashmaliciousMirai, OkiruBrowse
                                                                              zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                      zmap.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                        zmap.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                          zmap.x86.elfGet hashmaliciousOkiruBrowse
                                                                                            zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              geoplugin.netdocuments.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                              • 178.237.33.50
                                                                                              preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                              • 178.237.33.50
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              SKHT-ASShenzhenKatherineHengTechnologyInformationCo1E3Vcm2yrA.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                              • 154.216.18.169
                                                                                              icivfhp7cR.exeGet hashmaliciousGhostRatBrowse
                                                                                              • 45.207.211.42
                                                                                              6.elfGet hashmaliciousUnknownBrowse
                                                                                              • 154.211.34.18
                                                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              wind.arm.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              wind.x86.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              wind.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              wind.mips.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              wind.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              wind.m68k.elfGet hashmaliciousMiraiBrowse
                                                                                              • 154.216.16.103
                                                                                              ATOM86-ASATOM86NLdocuments.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                              • 178.237.33.50
                                                                                              No context
                                                                                              No context
                                                                                              Process:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):144
                                                                                              Entropy (8bit):3.379519383183141
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:rglsNlfUlVlNRxQ55JWRal2Jl+7R0DAlBG45klovDl6v:MlsNl8dNy5YcIeeDAlOWAv
                                                                                              MD5:904078D7BDDE9B1A1599AEB151E8952B
                                                                                              SHA1:376BA12B8A6A227318F738D2C3B3948F628DE157
                                                                                              SHA-256:8C2457FEB1CA48CD064F97CDCCB1DB5177D1828C8C33328D3AF1A70C4AF5060B
                                                                                              SHA-512:C13EECC5D2690CA5AC08BEB94EFCB751A6888F07AB04C65D51F56FFD1DC672B2125A69C63DF242BB98C1771B0DF26B3CB913F20E159846936B6AC24AB1A1E70B
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\edefdefffff\logs.dat, Author: Joe Security
                                                                                              Reputation:low
                                                                                              Preview:....[.2.0.2.5./.0.1./.1.3. .1.0.:.4.0.:.5.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                              Process:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              File Type:JSON data
                                                                                              Category:dropped
                                                                                              Size (bytes):963
                                                                                              Entropy (8bit):5.018722888793802
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zz2:qlupdRNuKyGX85jvXhNlT3/7XcV7Wro
                                                                                              MD5:267F9EC6CC4E12E1C5709DF015F4696F
                                                                                              SHA1:D9A4A1DB44DB5776CA5821E37206665999BFC558
                                                                                              SHA-256:8DB7063EB28EBF372CB46CDE7B85DCC719076BDD3A2DCA3CCF7E3881355AED3A
                                                                                              SHA-512:0907B58486F974BCD909ECA874F0A93E33DB534DEAA32EA3F332752C3D8CF284901187D642B22FE6718A8D98087D39BEE91317989AA62B3D1B0EA20D0CC8630A
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7126",. "geoplugin_longitude":"-74.0066",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                              Process:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              File Type:Extensible storage user DataBase, version 0x620, checksum 0x0564a741, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                              Category:dropped
                                                                                              Size (bytes):17301504
                                                                                              Entropy (8bit):1.0235334342912141
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:zvQPYV7AyUO+xBGA611GJxBGA611Gv0M6JKX3XX35X3khTAvhTA/hTATX3t8nqks:YyUt3F0TkT0TAitKxK9JdIC4Ago
                                                                                              MD5:173F47550DC15A1A89F9A96EEAFFD968
                                                                                              SHA1:97DF1B0FD6928638FBC4DAAA98C29C69163842C1
                                                                                              SHA-256:01DDA10860890AB4CBA1FAB0368913316D90044A9338BCA36C6A23CF98AE32BF
                                                                                              SHA-512:C266334736C28FFE8BB0B256798A41566CE9CDD9AD08380A6042BC6BDC88DB183AFFF0E915118A12D546500D46892C399EA4F88F3D609883851EB1A683E4BC2D
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:.d.A... .......4.........gN;....{........................&....../...{...)...}+.h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{..................................a.sr.)...}I.................Y..z.)...}I..........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):2
                                                                                              Entropy (8bit):1.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Qn:Qn
                                                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                              Malicious:false
                                                                                              Reputation:high, very likely benign file
                                                                                              Preview:..
                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):7.497265632064604
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                              • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                              File name:plugmancrypted.exe
                                                                                              File size:1'187'328 bytes
                                                                                              MD5:8e9211eea2ba6f1b345b696b10f9518a
                                                                                              SHA1:0d2cb42cee5bc56d6a6fab077e950fefd0af9c43
                                                                                              SHA256:11a4eadb74837d9fdc0f052302016abed805674c458529523101ced2ccaf4346
                                                                                              SHA512:c263aa2bbdd5394eab6d62a8f54ada0f3565ab154cbe754012f92580f5a5f24d347b938810986eaf160d4dc27726ab3b0104aba3ee7b87c0fea6f547c79c349f
                                                                                              SSDEEP:24576:gMaSSKy2/SPNZOgqiaanW8I3lwVvPIVVR+8hV:gRQuOgqiauSwVOVR+0
                                                                                              TLSH:EB459E593A7048F9C532CDF6A8E7863C6A70F95222E2C82625CF2E5C7CC9B4146D716F
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....0................0.............>2... ...@....@.. ....................................@................................
                                                                                              Icon Hash:00928e8e8686b000
                                                                                              Entrypoint:0x52323e
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0xF79C3086 [Tue Aug 23 02:46:30 2101 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                              Instruction
                                                                                              jmp dword ptr [00402000h]
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1231ec0x4f.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1240000x586.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000x1212440x1214005dcb9a884f8c9b0f93f0129ef3493133False0.6098290973422644data7.502376574673669IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0x1240000x5860x6007917ee58e543a9cd2ee68864c96ae9efFalse0.412109375data4.005064741943426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0x1260000xc0x200284b33a5d16c2bf873fe84bb5970ce21False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_VERSION0x1240a00x2fcdata0.43455497382198954
                                                                                              RT_MANIFEST0x12439c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                              DLLImport
                                                                                              mscoree.dll_CorExeMain
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-01-13T16:41:00.515575+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.649711154.216.16.382404TCP
                                                                                              2025-01-13T16:41:01.234575+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1154.216.16.382404192.168.2.649711TCP
                                                                                              2025-01-13T16:41:02.747408+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649715178.237.33.5080TCP
                                                                                              2025-01-13T16:43:06.600028+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1154.216.16.382404192.168.2.649711TCP
                                                                                              2025-01-13T16:45:06.685521+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1154.216.16.382404192.168.2.649711TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 13, 2025 16:41:00.505243063 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:00.510077000 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:00.510143995 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:00.515574932 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:00.520621061 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.234575033 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.237090111 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:01.241920948 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.392570972 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.394346952 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:01.400289059 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.400388002 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:01.400429964 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:01.406873941 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.438956022 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.098257065 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098299026 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098332882 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098354101 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.098362923 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098397017 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098419905 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.098432064 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098468065 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098481894 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.098505974 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098537922 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098556995 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.098572969 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098608017 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.098628998 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.103919983 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.103955030 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.103975058 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.103991032 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.104039907 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.104837894 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:41:02.109725952 CET8049715178.237.33.50192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.109795094 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:41:02.109913111 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:41:02.114718914 CET8049715178.237.33.50192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.170913935 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.170991898 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171025038 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171050072 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.171061039 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171097994 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171107054 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.171137094 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171190023 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.171801090 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171859026 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171895027 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171911001 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.171932936 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.171988964 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.172770023 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.172805071 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.172841072 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.172871113 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.172878027 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.172936916 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.173654079 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.173712015 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.173746109 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.173763990 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.173782110 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.173851967 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.176070929 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.176127911 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.176183939 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.176275015 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.176327944 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.176363945 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.176378012 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.220102072 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.279717922 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279792070 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279829025 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279841900 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.279865980 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279903889 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279910088 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.279939890 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279978037 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.279994965 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.280014992 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280067921 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.280139923 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280175924 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280210972 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280225992 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.280495882 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280530930 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280565977 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280566931 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.280601025 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280611992 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.280637026 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280688047 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.280941963 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.280977011 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281012058 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281023026 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.281045914 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281080961 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281097889 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.281116009 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281152010 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281164885 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.281188011 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281249046 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.281783104 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281816959 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281852961 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281872034 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.281888962 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281924009 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281940937 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.281959057 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.281994104 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282011986 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.282027960 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282063961 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282078981 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.282699108 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282733917 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282754898 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.282772064 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282807112 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282814026 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.282843113 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282877922 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.282897949 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.284885883 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.284939051 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.284974098 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.285012007 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.285022020 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.285022020 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.329480886 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388436079 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388539076 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388571978 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388611078 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388627052 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388664007 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388679028 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388698101 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388732910 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388750076 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388767958 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388819933 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388822079 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388858080 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388894081 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388912916 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388926983 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388962030 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.388973951 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.388995886 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389030933 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389050007 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389067888 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389118910 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389178038 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389226913 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389261007 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389276981 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389314890 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389350891 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389367104 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389403105 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389440060 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389461040 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389473915 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389508963 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389523029 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389542103 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389576912 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389592886 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389610052 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389645100 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389661074 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389678001 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389713049 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389729023 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389746904 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389801025 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389806986 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389862061 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389895916 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389911890 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389930010 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389965057 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.389982939 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.389993906 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390028000 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390048027 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390063047 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390095949 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390115976 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390131950 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390165091 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390185118 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390218019 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390264034 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390268087 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390304089 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390337944 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390357018 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390372992 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390405893 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390419960 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390445948 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390481949 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390491009 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390516996 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390551090 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390567064 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390585899 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390619993 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390636921 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390655041 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390688896 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390706062 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390723944 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390758038 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390774012 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390794039 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390811920 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390827894 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.390841961 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.390877008 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.393925905 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.393943071 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.393959045 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.393975019 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.393992901 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.394017935 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.394073963 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394098997 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394115925 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394129992 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394145966 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.394146919 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394164085 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394174099 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.394180059 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394188881 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394206047 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394222021 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394226074 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.394239902 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.394270897 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.438859940 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.475245953 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.475300074 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.475357056 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.475385904 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.475425959 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.475465059 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.475481033 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.475503922 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.475553036 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522233963 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522280931 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522296906 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522311926 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522320032 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522337914 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522347927 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522365093 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522372961 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522389889 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522404909 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522404909 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522424936 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522439957 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522454977 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522469997 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522475958 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522476912 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522486925 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522496939 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522511959 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522535086 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522536039 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522552967 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522568941 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522583008 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522598982 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522607088 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522607088 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522614002 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522633076 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522645950 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522650003 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522674084 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522679090 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522690058 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522707939 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522720098 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522722006 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522739887 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522753954 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522763014 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522768974 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522785902 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522793055 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522809029 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522819042 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522825956 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522842884 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522850037 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522860050 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522876024 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522886038 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522891045 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522907019 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522929907 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522931099 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522948980 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522952080 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.522964954 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522979975 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522994041 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.522994041 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523010969 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523020029 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523026943 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523044109 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523055077 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523058891 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523075104 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523087025 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523089886 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523098946 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523106098 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523121119 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523139954 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523144007 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523158073 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523166895 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523171902 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523189068 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523201942 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523204088 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523221970 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523261070 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523261070 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523330927 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523346901 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523361921 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523375988 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523390055 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523391008 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523406982 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523422003 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523431063 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523446083 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523459911 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523485899 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523500919 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523515940 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523518085 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523536921 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523540974 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523557901 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523572922 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523588896 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523588896 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523605108 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523617029 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523622036 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523637056 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523653030 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523654938 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523668051 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523680925 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523684025 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523699999 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523714066 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523719072 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523730993 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523732901 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523747921 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523761988 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523768902 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523771048 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523786068 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523799896 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523801088 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523818016 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523823977 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.523834944 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.523861885 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.524143934 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524167061 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524183035 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524194002 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.524198055 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524214983 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524224997 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.524229050 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524245977 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524256945 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.524260998 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524276972 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524286985 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.524292946 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.524315119 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.529654980 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.561944008 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.561966896 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.561997890 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562016010 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562025070 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562041044 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562045097 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562057018 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562074900 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562088013 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562092066 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562108040 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562124968 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562128067 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562140942 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562155962 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562156916 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562174082 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562181950 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562191963 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562206984 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562223911 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.562226057 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.562259912 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604175091 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604232073 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604250908 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604270935 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604322910 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604336977 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604360104 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604393959 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604425907 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604450941 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604485035 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604516983 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604540110 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604589939 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604595900 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604624033 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604655981 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604666948 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604691029 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604708910 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604723930 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604742050 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604758024 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604790926 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604809999 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604825974 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604861021 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604882002 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604895115 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604927063 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604949951 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.604959965 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.604991913 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605010986 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.605026007 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605053902 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605070114 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.605087996 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605122089 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605133057 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.605155945 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605191946 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.605211020 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.626483917 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626543999 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626554966 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.626584053 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626648903 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.626682043 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626774073 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626827002 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626841068 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.626880884 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626916885 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.626936913 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.626970053 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627001047 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627032042 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627054930 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627105951 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627105951 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627140045 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627176046 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627206087 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627209902 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627259970 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627263069 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627298117 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627351046 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627362013 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627418041 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627454996 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627490044 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627516985 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627572060 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627585888 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627624035 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627660036 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627677917 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627693892 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627728939 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627752066 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627762079 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627795935 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627814054 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627830029 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627862930 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627880096 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627897978 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627932072 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.627943039 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.627965927 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628000021 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628010035 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628034115 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628070116 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628087997 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628103018 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628138065 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628154039 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628175020 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628211975 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628227949 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628247023 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628282070 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628294945 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628314972 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628350019 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628360987 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628386974 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628421068 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628439903 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628456116 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628490925 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628501892 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628524065 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628557920 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628567934 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628592014 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628626108 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628639936 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628659964 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628695011 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628707886 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628729105 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628766060 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628781080 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628799915 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628834009 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628849030 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628865957 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628900051 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628922939 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628932953 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628968000 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.628983021 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.628999949 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629034996 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629050016 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629067898 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629102945 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629117966 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629136086 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629169941 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629184961 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629204035 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629239082 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629252911 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629271984 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629307032 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629322052 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629343987 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629379034 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629395008 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629412889 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629448891 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629462957 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.629482985 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.629534960 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649096012 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649142027 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649202108 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649204969 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649238110 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649274111 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649291039 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649310112 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649346113 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649363995 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649382114 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649415970 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649427891 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649455070 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649488926 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649508953 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649523973 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649559021 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649574041 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.649593115 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649631977 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.649642944 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.690938950 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.690995932 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.690999985 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691026926 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691076994 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691081047 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691117048 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691149950 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691169977 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691204071 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691248894 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691257000 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691292048 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691349030 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691358089 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691411972 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691462040 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691464901 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691500902 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691540956 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691551924 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691586971 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691618919 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691639900 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691660881 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691693068 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691706896 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691731930 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691765070 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691786051 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691801071 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691833973 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691848040 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691868067 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691900969 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691921949 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.691950083 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.691982985 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.692003965 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.692018986 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.692054033 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.692065954 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.692091942 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.692121983 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.692137003 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.714843035 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.714879036 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.714915037 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.714947939 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.714972973 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.714982033 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.715010881 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.715015888 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.715038061 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.715051889 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.715080976 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.715116024 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.746825933 CET8049715178.237.33.50192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.747407913 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:41:02.761392117 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:02.766403913 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:02.767041922 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:03.740525961 CET8049715178.237.33.50192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.740588903 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:41:03.934555054 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:03.939662933 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939682007 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939693928 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939704895 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939718008 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939729929 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939742088 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939749956 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:03.939754009 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939774036 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:03.939822912 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.939837933 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.944721937 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.944734097 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.944746017 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.944757938 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.944781065 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.944792986 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.945166111 CET240449714154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:03.945225000 CET497142404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:06.523367882 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:06.525437117 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:06.530328989 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:36.536298037 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:36.543874025 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:41:36.548630953 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:41:42.634913921 CET5873853192.168.2.6162.159.36.2
                                                                                              Jan 13, 2025 16:41:42.639866114 CET5358738162.159.36.2192.168.2.6
                                                                                              Jan 13, 2025 16:41:42.639940977 CET5873853192.168.2.6162.159.36.2
                                                                                              Jan 13, 2025 16:41:42.644742966 CET5358738162.159.36.2192.168.2.6
                                                                                              Jan 13, 2025 16:41:43.112132072 CET5873853192.168.2.6162.159.36.2
                                                                                              Jan 13, 2025 16:41:43.117290974 CET5358738162.159.36.2192.168.2.6
                                                                                              Jan 13, 2025 16:41:43.117403030 CET5873853192.168.2.6162.159.36.2
                                                                                              Jan 13, 2025 16:42:06.571300983 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:42:06.572952986 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:42:06.577817917 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:42:36.579173088 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:42:36.580831051 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:42:36.585676908 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:42:51.880719900 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:42:52.345288992 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:42:52.956630945 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:42:54.157797098 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:42:56.657790899 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:43:01.642283916 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:43:06.600028038 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:43:06.601135015 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:43:06.606254101 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:43:11.251573086 CET4971580192.168.2.6178.237.33.50
                                                                                              Jan 13, 2025 16:43:36.643284082 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:43:36.651874065 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:43:36.656656981 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:44:06.657357931 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:44:06.659003973 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:44:06.665859938 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:44:36.672060966 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:44:36.674055099 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:44:36.678987026 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:45:06.685520887 CET240449711154.216.16.38192.168.2.6
                                                                                              Jan 13, 2025 16:45:06.685834885 CET497112404192.168.2.6154.216.16.38
                                                                                              Jan 13, 2025 16:45:06.690675974 CET240449711154.216.16.38192.168.2.6
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 13, 2025 16:41:00.485100031 CET5814353192.168.2.61.1.1.1
                                                                                              Jan 13, 2025 16:41:00.498656988 CET53581431.1.1.1192.168.2.6
                                                                                              Jan 13, 2025 16:41:01.922707081 CET5699553192.168.2.61.1.1.1
                                                                                              Jan 13, 2025 16:41:02.101342916 CET53569951.1.1.1192.168.2.6
                                                                                              Jan 13, 2025 16:41:42.634460926 CET5359628162.159.36.2192.168.2.6
                                                                                              Jan 13, 2025 16:41:43.131608009 CET53510821.1.1.1192.168.2.6
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Jan 13, 2025 16:41:00.485100031 CET192.168.2.61.1.1.10x1fe9Standard query (0)www.kposlifestyle.designA (IP address)IN (0x0001)false
                                                                                              Jan 13, 2025 16:41:01.922707081 CET192.168.2.61.1.1.10xa003Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Jan 13, 2025 16:41:00.498656988 CET1.1.1.1192.168.2.60x1fe9No error (0)www.kposlifestyle.design154.216.16.38A (IP address)IN (0x0001)false
                                                                                              Jan 13, 2025 16:41:02.101342916 CET1.1.1.1192.168.2.60xa003No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                              • geoplugin.net
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.649715178.237.33.50803196C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Jan 13, 2025 16:41:02.109913111 CET71OUTGET /json.gp HTTP/1.1
                                                                                              Host: geoplugin.net
                                                                                              Cache-Control: no-cache
                                                                                              Jan 13, 2025 16:41:02.746825933 CET1171INHTTP/1.1 200 OK
                                                                                              date: Mon, 13 Jan 2025 15:41:02 GMT
                                                                                              server: Apache
                                                                                              content-length: 963
                                                                                              content-type: application/json; charset=utf-8
                                                                                              cache-control: public, max-age=300
                                                                                              access-control-allow-origin: *
                                                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                              Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7126", "geoplugin_longitude":"-74.0066", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:10:40:58
                                                                                              Start date:13/01/2025
                                                                                              Path:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\plugmancrypted.exe"
                                                                                              Imagebase:0xeb0000
                                                                                              File size:1'187'328 bytes
                                                                                              MD5 hash:8E9211EEA2BA6F1B345B696B10F9518A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4576731239.0000000004459000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:2
                                                                                              Start time:10:40:59
                                                                                              Start date:13/01/2025
                                                                                              Path:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\plugmancrypted.exe"
                                                                                              Imagebase:0x5c0000
                                                                                              File size:1'187'328 bytes
                                                                                              MD5 hash:8E9211EEA2BA6F1B345B696B10F9518A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4573375756.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:5
                                                                                              Start time:10:41:01
                                                                                              Start date:13/01/2025
                                                                                              Path:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\rmyogdkzuvqwsizhgmytmyqaadgtjrqw"
                                                                                              Imagebase:0xe30000
                                                                                              File size:1'187'328 bytes
                                                                                              MD5 hash:8E9211EEA2BA6F1B345B696B10F9518A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:6
                                                                                              Start time:10:41:01
                                                                                              Start date:13/01/2025
                                                                                              Path:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\bglg"
                                                                                              Imagebase:0x980000
                                                                                              File size:1'187'328 bytes
                                                                                              MD5 hash:8E9211EEA2BA6F1B345B696B10F9518A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:7
                                                                                              Start time:10:41:02
                                                                                              Start date:13/01/2025
                                                                                              Path:C:\Users\user\Desktop\plugmancrypted.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Users\user\Desktop\plugmancrypted.exe /stext "C:\Users\user\AppData\Local\Temp\diqzhgnu"
                                                                                              Imagebase:0xdc0000
                                                                                              File size:1'187'328 bytes
                                                                                              MD5 hash:8E9211EEA2BA6F1B345B696B10F9518A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:10%
                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                Signature Coverage:16.7%
                                                                                                Total number of Nodes:246
                                                                                                Total number of Limit Nodes:11
                                                                                                execution_graph 38460 31cd01c 38461 31cd034 38460->38461 38462 31cd08e 38461->38462 38464 59b1bd1 38461->38464 38465 59b1bda 38464->38465 38466 59b1bbf 38464->38466 38467 59b1be7 38465->38467 38469 59b1cf8 38465->38469 38466->38462 38467->38462 38470 59b1d01 38469->38470 38471 59b1e76 38470->38471 38473 59b1b08 38470->38473 38477 59b1b38 SetWindowLongW 38473->38477 38479 59b1b30 38473->38479 38474 59b1b20 38474->38471 38478 59b1ba4 38477->38478 38478->38474 38480 59b1b38 SetWindowLongW 38479->38480 38481 59b1ba4 38480->38481 38481->38474 38514 589d3d8 38515 589d41e 38514->38515 38519 589d5a8 38515->38519 38523 589d5b8 38515->38523 38516 589d50b 38520 589d5b8 38519->38520 38526 589b730 38520->38526 38524 589b730 DuplicateHandle 38523->38524 38525 589d5e6 38524->38525 38525->38516 38527 589d620 DuplicateHandle 38526->38527 38528 589d5e6 38527->38528 38528->38516 38537 5894668 38538 589467a 38537->38538 38539 5894686 38538->38539 38543 5894779 38538->38543 38548 5893e10 38539->38548 38541 58946a5 38544 589479d 38543->38544 38552 5894888 38544->38552 38556 5894878 38544->38556 38549 5893e1b 38548->38549 38564 5895c64 38549->38564 38551 5896fcf 38551->38541 38553 58948af 38552->38553 38555 589498c 38553->38555 38560 5894248 38553->38560 38557 5894888 38556->38557 38558 589498c 38557->38558 38559 5894248 CreateActCtxA 38557->38559 38558->38558 38559->38558 38561 5895918 CreateActCtxA 38560->38561 38563 58959db 38561->38563 38563->38563 38565 5895c6f 38564->38565 38568 5895c84 38565->38568 38567 5897085 38567->38551 38569 5895c8f 38568->38569 38572 5895cb4 38569->38572 38571 5897162 38571->38567 38573 5895cbf 38572->38573 38576 5895ce4 38573->38576 38575 5897265 38575->38571 38577 5895cef 38576->38577 38579 589856b 38577->38579 38583 589ac18 38577->38583 38578 58985a9 38578->38575 38579->38578 38587 589cd10 38579->38587 38592 589cd00 38579->38592 38597 589ac40 38583->38597 38600 589ac50 38583->38600 38584 589ac2e 38584->38579 38588 589cd31 38587->38588 38589 589cd55 38588->38589 38608 589ceb1 38588->38608 38612 589cec0 38588->38612 38589->38578 38593 589cd31 38592->38593 38594 589cd55 38593->38594 38595 589ceb1 5 API calls 38593->38595 38596 589cec0 5 API calls 38593->38596 38594->38578 38595->38594 38596->38594 38603 589ad48 38597->38603 38598 589ac5f 38598->38584 38601 589ac5f 38600->38601 38602 589ad48 GetModuleHandleW 38600->38602 38601->38584 38602->38601 38604 589ad7c 38603->38604 38605 589ad59 38603->38605 38604->38598 38605->38604 38606 589af80 GetModuleHandleW 38605->38606 38607 589afad 38606->38607 38607->38598 38609 589cec0 38608->38609 38610 589cf07 38609->38610 38616 589b720 38609->38616 38610->38589 38613 589cecd 38612->38613 38614 589b720 5 API calls 38613->38614 38615 589cf07 38613->38615 38614->38615 38615->38589 38617 589b72b 38616->38617 38619 589dc18 38617->38619 38620 589d024 38617->38620 38619->38619 38621 589d02f 38620->38621 38622 5895ce4 5 API calls 38621->38622 38623 589dc87 38622->38623 38627 589dc96 38623->38627 38630 589dcf2 38623->38630 38634 589dd00 38623->38634 38624 589dcc1 38624->38619 38638 589fa08 38627->38638 38643 589f9f0 38627->38643 38632 589dd00 38630->38632 38631 589ddff 38632->38631 38633 589ddfa KiUserCallbackDispatcher 38632->38633 38633->38631 38635 589dd2e 38634->38635 38636 589ddfa KiUserCallbackDispatcher 38635->38636 38637 589ddff 38635->38637 38636->38637 38639 589fa45 38638->38639 38640 589fa39 38638->38640 38639->38624 38640->38639 38641 59b09b0 CreateWindowExW CreateWindowExW 38640->38641 38642 59b09c0 CreateWindowExW CreateWindowExW 38640->38642 38641->38639 38642->38639 38644 589fa45 38643->38644 38645 589fa39 38643->38645 38644->38624 38645->38644 38646 59b09b0 CreateWindowExW CreateWindowExW 38645->38646 38647 59b09c0 CreateWindowExW CreateWindowExW 38645->38647 38646->38644 38647->38644 38529 59bce48 38530 59bce5b 38529->38530 38533 59bac78 38530->38533 38532 59bcf28 38535 59bac83 38533->38535 38534 59bfbf2 38534->38532 38535->38534 38536 59b1b08 2 API calls 38535->38536 38536->38534 38648 589fee0 38649 589ff07 38648->38649 38653 97d02ab 38649->38653 38658 97d0287 38649->38658 38650 589ff2b 38654 97d02be 38653->38654 38663 97d0588 PostMessageW 38654->38663 38665 97d0562 PostMessageW 38654->38665 38655 97d02e1 38655->38650 38659 97d02ac 38658->38659 38660 97d028d 38658->38660 38661 97d0588 PostMessageW 38659->38661 38662 97d0562 PostMessageW 38659->38662 38660->38650 38661->38660 38662->38660 38664 97d05f4 38663->38664 38664->38655 38666 97d05f4 38665->38666 38666->38655 38482 59b4050 38483 59b4092 38482->38483 38485 59b4099 38482->38485 38484 59b40ea CallWindowProcW 38483->38484 38483->38485 38484->38485 38667 59bbeb0 38668 59bbeca 38667->38668 38669 59bbf1a 38668->38669 38672 59bbf70 38668->38672 38698 59bbf60 38668->38698 38673 59bbfa3 38672->38673 38724 59bab84 38673->38724 38675 59bc17a 38676 59bab90 Wow64GetThreadContext 38675->38676 38677 59bc274 38675->38677 38676->38677 38678 59baba8 ReadProcessMemory 38677->38678 38679 59bc354 38678->38679 38696 59bbd38 VirtualAllocEx 38679->38696 38697 59bbd40 VirtualAllocEx 38679->38697 38680 59bc471 38694 59bbc48 WriteProcessMemory 38680->38694 38695 59bbc50 WriteProcessMemory 38680->38695 38681 59bc750 38688 59bbc48 WriteProcessMemory 38681->38688 38689 59bbc50 WriteProcessMemory 38681->38689 38682 59bc555 38682->38681 38686 59bbc48 WriteProcessMemory 38682->38686 38687 59bbc50 WriteProcessMemory 38682->38687 38683 59bc78e 38684 59bc876 38683->38684 38692 59bbb78 Wow64SetThreadContext 38683->38692 38693 59bbb71 Wow64SetThreadContext 38683->38693 38690 59bbdf8 ResumeThread 38684->38690 38691 59bbe00 ResumeThread 38684->38691 38685 59bc933 38685->38668 38686->38682 38687->38682 38688->38683 38689->38683 38690->38685 38691->38685 38692->38684 38693->38684 38694->38682 38695->38682 38696->38680 38697->38680 38700 59bbf70 38698->38700 38699 59bab84 CreateProcessW 38701 59bc17a 38699->38701 38700->38699 38703 59bc274 38701->38703 38728 59bab90 38701->38728 38732 59baba8 38703->38732 38705 59bc354 38735 59bbd38 38705->38735 38739 59bbd40 38705->38739 38706 59bc471 38743 59bbc48 38706->38743 38747 59bbc50 38706->38747 38707 59bc750 38720 59bbc48 WriteProcessMemory 38707->38720 38721 59bbc50 WriteProcessMemory 38707->38721 38708 59bc555 38708->38707 38716 59bbc48 WriteProcessMemory 38708->38716 38717 59bbc50 WriteProcessMemory 38708->38717 38709 59bc78e 38710 59bc876 38709->38710 38751 59bbb78 38709->38751 38755 59bbb71 38709->38755 38759 59bbdf8 38710->38759 38763 59bbe00 38710->38763 38711 59bc933 38711->38668 38716->38708 38717->38708 38720->38709 38721->38709 38725 59bcaa0 CreateProcessW 38724->38725 38727 59bcbf1 38725->38727 38729 59bccd0 Wow64GetThreadContext 38728->38729 38731 59bcd4a 38729->38731 38731->38703 38733 59bcd88 ReadProcessMemory 38732->38733 38734 59bce08 38733->38734 38734->38705 38736 59bbd40 VirtualAllocEx 38735->38736 38738 59bbdbd 38736->38738 38738->38706 38740 59bbd80 VirtualAllocEx 38739->38740 38742 59bbdbd 38740->38742 38742->38706 38744 59bbc50 WriteProcessMemory 38743->38744 38746 59bbcef 38744->38746 38746->38708 38748 59bbc98 WriteProcessMemory 38747->38748 38750 59bbcef 38748->38750 38750->38708 38752 59bbbbd Wow64SetThreadContext 38751->38752 38754 59bbc05 38752->38754 38754->38710 38756 59bbb78 Wow64SetThreadContext 38755->38756 38758 59bbc05 38756->38758 38758->38710 38760 59bbe00 ResumeThread 38759->38760 38762 59bbe71 38760->38762 38762->38711 38764 59bbe40 ResumeThread 38763->38764 38766 59bbe71 38764->38766 38766->38711 38486 97d1a70 38487 97d1a8a 38486->38487 38488 97d1a9d 38486->38488 38492 97d0760 38487->38492 38490 97d1ae3 38488->38490 38491 97d0760 OleInitialize 38488->38491 38491->38490 38493 97d076b 38492->38493 38494 97d1b0e 38493->38494 38497 97d1b38 38493->38497 38502 97d1b48 38493->38502 38494->38488 38498 97d1b70 38497->38498 38501 97d1b9c 38497->38501 38499 97d1b79 38498->38499 38507 97d07fc 38498->38507 38499->38494 38501->38494 38503 97d1b70 38502->38503 38506 97d1b9c 38502->38506 38504 97d1b79 38503->38504 38505 97d07fc OleInitialize 38503->38505 38504->38494 38505->38506 38506->38494 38508 97d0807 38507->38508 38509 97d1e93 38508->38509 38511 97d0818 38508->38511 38509->38501 38512 97d1ec8 OleInitialize 38511->38512 38513 97d1f2c 38512->38513 38513->38509 38767 97d9680 38769 97d96e5 38767->38769 38770 97d9732 38769->38770 38771 97d92ac 38769->38771 38772 97da3e8 DispatchMessageW 38771->38772 38773 97da454 38772->38773 38773->38769

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 59bbf70-59bbfa1 1 59bbfa8-59bc12e 0->1 2 59bbfa3 0->2 9 59bc130-59bc154 1->9 10 59bc155-59bc19a call 59bab84 1->10 2->1 9->10 14 59bc19c-59bc1b8 10->14 15 59bc1c3-59bc22d 10->15 14->15 21 59bc22f 15->21 22 59bc234-59bc260 15->22 21->22 24 59bc262-59bc26f call 59bab90 22->24 25 59bc2c1-59bc2f3 call 59bab9c 22->25 29 59bc274-59bc294 24->29 30 59bc31c 25->30 31 59bc2f5-59bc311 25->31 32 59bc2bd-59bc2bf 29->32 33 59bc296-59bc2b2 29->33 34 59bc31d-59bc327 30->34 31->30 32->34 33->32 36 59bc329 34->36 37 59bc32e-59bc374 call 59baba8 34->37 36->37 43 59bc39d-59bc3b6 37->43 44 59bc376-59bc392 37->44 45 59bc3b8-59bc3e4 call 59babb4 43->45 46 59bc40e-59bc46c 43->46 44->43 52 59bc40d 45->52 53 59bc3e6-59bc402 45->53 132 59bc46f call 59bbd38 46->132 133 59bc46f call 59bbd40 46->133 52->46 53->52 56 59bc471-59bc486 57 59bc49b-59bc49d 56->57 58 59bc488-59bc499 56->58 60 59bc4a3-59bc4b7 57->60 58->60 61 59bc4b9-59bc4f3 60->61 62 59bc4f4-59bc50b 60->62 61->62 63 59bc50d-59bc529 62->63 64 59bc534-59bc550 62->64 63->64 130 59bc553 call 59bbc48 64->130 131 59bc553 call 59bbc50 64->131 67 59bc555-59bc575 68 59bc59e-59bc5d3 67->68 69 59bc577-59bc593 67->69 73 59bc72b-59bc74a 68->73 69->68 74 59bc5d8-59bc65c 73->74 75 59bc750-59bc789 73->75 85 59bc662-59bc6d1 74->85 86 59bc720-59bc725 74->86 124 59bc78c call 59bbc48 75->124 125 59bc78c call 59bbc50 75->125 80 59bc78e-59bc7ae 81 59bc7b0-59bc7cc 80->81 82 59bc7d7-59bc80a 80->82 81->82 88 59bc80c-59bc813 82->88 89 59bc814-59bc827 82->89 122 59bc6d4 call 59bbc48 85->122 123 59bc6d4 call 59bbc50 85->123 86->73 88->89 91 59bc829 89->91 92 59bc82e-59bc859 89->92 91->92 96 59bc85b-59bc871 92->96 97 59bc8c3-59bc8f5 call 59babc0 92->97 128 59bc874 call 59bbb78 96->128 129 59bc874 call 59bbb71 96->129 106 59bc91e 97->106 107 59bc8f7-59bc913 97->107 99 59bc6d6-59bc6f6 102 59bc6f8-59bc714 99->102 103 59bc71f 99->103 101 59bc876-59bc896 104 59bc898-59bc8b4 101->104 105 59bc8bf-59bc8c1 101->105 102->103 103->86 104->105 109 59bc91f-59bc92e 105->109 106->109 107->106 126 59bc931 call 59bbdf8 109->126 127 59bc931 call 59bbe00 109->127 113 59bc933-59bc953 115 59bc97c-59bca85 113->115 116 59bc955-59bc971 113->116 116->115 122->99 123->99 124->80 125->80 126->113 127->113 128->101 129->101 130->67 131->67 132->56 133->56
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID: (
                                                                                                • API String ID: 963392458-3887548279
                                                                                                • Opcode ID: afa907dac7ea342af47a650233512a63b3f2d219f91862c5e9e3f26f040c0ca4
                                                                                                • Instruction ID: 498b4adc2ba734aaa312eaf1e0d11b8da11802df2fd409fd56d6c990d86c0255
                                                                                                • Opcode Fuzzy Hash: afa907dac7ea342af47a650233512a63b3f2d219f91862c5e9e3f26f040c0ca4
                                                                                                • Instruction Fuzzy Hash: AC52E074E012298FEB64DF65C984BEDB7B2BF89300F5085EAD409AB291DB745E85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 92ad8939ff1e418ca751c0643580cbd339d5782bf05fb119aacd2937f43eaca1
                                                                                                • Instruction ID: a89c453a536e1f9b39387ea1b46e3bd00f700d519b79c2333f41b0090b3f2821
                                                                                                • Opcode Fuzzy Hash: 92ad8939ff1e418ca751c0643580cbd339d5782bf05fb119aacd2937f43eaca1
                                                                                                • Instruction Fuzzy Hash: 88320275E052298FEB64CF65C944BEDBBB2BF89300F1084EAD409AB290DB745E85CF40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: DispatchMessage
                                                                                                • String ID:
                                                                                                • API String ID: 2061451462-0
                                                                                                • Opcode ID: d9d4519e0effc84c20e2f66f193e21783f764450bc1d1fe64284a30adb3c3d3a
                                                                                                • Instruction ID: 5a4ac6aee919d4c537026f75c0114e140f05add602c46f2f633ebc2ed0bb87e8
                                                                                                • Opcode Fuzzy Hash: d9d4519e0effc84c20e2f66f193e21783f764450bc1d1fe64284a30adb3c3d3a
                                                                                                • Instruction Fuzzy Hash: F8F14935A02309CFDB14DFA9C948B9DBBF1FF88314F158168E609AF265DB74A945CB80
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: aab614b574e14c3503dbaa6db3744dc99d34b03425ad2ddbb352b63a1531e066
                                                                                                • Instruction ID: c1d91248140b9493d3fbf5e761e195d3832868460a54ec6522c9054371fda515
                                                                                                • Opcode Fuzzy Hash: aab614b574e14c3503dbaa6db3744dc99d34b03425ad2ddbb352b63a1531e066
                                                                                                • Instruction Fuzzy Hash: 8281A034B012189BEB0CEF7595546BF7BB7BFC9740F058429E406EB288CF35884297A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8a773ff3a54a66a5784028d85673b4243b075f67d9b6aa08b69a24df373a5f57
                                                                                                • Instruction ID: 8ae0d9f4d280b0899f3b2f5582b4e9a453a88bd070e29dc7be590a00460ee131
                                                                                                • Opcode Fuzzy Hash: 8a773ff3a54a66a5784028d85673b4243b075f67d9b6aa08b69a24df373a5f57
                                                                                                • Instruction Fuzzy Hash: C3A1AE74E042198FEB14DFA9C584ADDFBF2BF48310F2485A9D809AB356D774A981CF90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 134 589ad48-589ad57 135 589ad59-589ad66 call 589a0a0 134->135 136 589ad83-589ad87 134->136 142 589ad68 135->142 143 589ad7c 135->143 138 589ad89-589ad93 136->138 139 589ad9b-589addc 136->139 138->139 145 589ade9-589adf7 139->145 146 589adde-589ade6 139->146 190 589ad6e call 589afd0 142->190 191 589ad6e call 589afe0 142->191 143->136 147 589adf9-589adfe 145->147 148 589ae1b-589ae1d 145->148 146->145 150 589ae09 147->150 151 589ae00-589ae07 call 589a0ac 147->151 153 589ae20-589ae27 148->153 149 589ad74-589ad76 149->143 152 589aeb8-589af78 149->152 155 589ae0b-589ae19 150->155 151->155 185 589af7a-589af7d 152->185 186 589af80-589afab GetModuleHandleW 152->186 156 589ae29-589ae31 153->156 157 589ae34-589ae3b 153->157 155->153 156->157 158 589ae48-589ae4a call 589a0bc 157->158 159 589ae3d-589ae45 157->159 163 589ae4f-589ae51 158->163 159->158 165 589ae5e-589ae63 163->165 166 589ae53-589ae5b 163->166 167 589ae81-589ae8e 165->167 168 589ae65-589ae6c 165->168 166->165 175 589aeb1-589aeb7 167->175 176 589ae90-589aeae 167->176 168->167 170 589ae6e-589ae7e call 589a0cc call 589a0dc 168->170 170->167 176->175 185->186 187 589afad-589afb3 186->187 188 589afb4-589afc8 186->188 187->188 190->149 191->149
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0589AF9E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 4139908857-0
                                                                                                • Opcode ID: 715338b5e9d2add6af15beab242feceda4a88c5a15d8c2717bcaf37fb0c8648a
                                                                                                • Instruction ID: 673e8cf898fdabc74ef96611137489e20959f1b1ec9f0438ff6f0e27c4f8477f
                                                                                                • Opcode Fuzzy Hash: 715338b5e9d2add6af15beab242feceda4a88c5a15d8c2717bcaf37fb0c8648a
                                                                                                • Instruction Fuzzy Hash: E0711770A00B058FDB28DF2AD45576ABBF6FF88204F04892DD89AD7A40DB75E845CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 192 59bab84-59bcb19 194 59bcb1b-59bcb1e 192->194 195 59bcb21-59bcb28 192->195 194->195 196 59bcb2a-59bcb30 195->196 197 59bcb33-59bcb49 195->197 196->197 198 59bcb4b-59bcb51 197->198 199 59bcb54-59bcbef CreateProcessW 197->199 198->199 201 59bcbf8-59bcc6c 199->201 202 59bcbf1-59bcbf7 199->202 210 59bcc7e-59bcc85 201->210 211 59bcc6e-59bcc74 201->211 202->201 212 59bcc9c 210->212 213 59bcc87-59bcc96 210->213 211->210 215 59bcc9d 212->215 213->212 215->215
                                                                                                APIs
                                                                                                • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,00000000,?), ref: 059BCBDC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 968ddadc621f6926354be410041679bf5aaceb8a15de3dee9cb9f0d3437c46f2
                                                                                                • Instruction ID: 0a1040ceed9ab9aaaa7dd2eb932aa5ad0efd4436949894e800cef113b305e2e4
                                                                                                • Opcode Fuzzy Hash: 968ddadc621f6926354be410041679bf5aaceb8a15de3dee9cb9f0d3437c46f2
                                                                                                • Instruction Fuzzy Hash: F2512571901329DFEB24CF99C944BDDBBB6BF49300F0080AAE948A7250D7759E88CF91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 216 59bca96-59bcb19 217 59bcb1b-59bcb1e 216->217 218 59bcb21-59bcb28 216->218 217->218 219 59bcb2a-59bcb30 218->219 220 59bcb33-59bcb49 218->220 219->220 221 59bcb4b-59bcb51 220->221 222 59bcb54-59bcbef CreateProcessW 220->222 221->222 224 59bcbf8-59bcc6c 222->224 225 59bcbf1-59bcbf7 222->225 233 59bcc7e-59bcc85 224->233 234 59bcc6e-59bcc74 224->234 225->224 235 59bcc9c 233->235 236 59bcc87-59bcc96 233->236 234->233 238 59bcc9d 235->238 236->235 238->238
                                                                                                APIs
                                                                                                • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,00000000,?), ref: 059BCBDC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 547d8ba1180305d45661e051330f622954ff4cd08d305facd1ee72cb2e6ece55
                                                                                                • Instruction ID: 24402975d562ea6b688ac713b7beea5d5238ebec02591b4dcc17b6423313483b
                                                                                                • Opcode Fuzzy Hash: 547d8ba1180305d45661e051330f622954ff4cd08d305facd1ee72cb2e6ece55
                                                                                                • Instruction Fuzzy Hash: C4512571901329DFEB24CF99C940BDDBBB6BF49300F1080AAE948A7240D7759A88CF51

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 239 59b18e4-59b1956 241 59b1958-59b195e 239->241 242 59b1961-59b1968 239->242 241->242 243 59b196a-59b1970 242->243 244 59b1973-59b1a12 CreateWindowExW 242->244 243->244 246 59b1a1b-59b1a53 244->246 247 59b1a14-59b1a1a 244->247 251 59b1a60 246->251 252 59b1a55-59b1a58 246->252 247->246 253 59b1a61 251->253 252->251 253->253
                                                                                                APIs
                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059B1A02
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateWindow
                                                                                                • String ID:
                                                                                                • API String ID: 716092398-0
                                                                                                • Opcode ID: cb680dc924ba5025bf93285b5d0e040889bf3cb8a34bbbdbb8d24ba11023098b
                                                                                                • Instruction ID: da23099190a119a3375bbfdfac3ca0bcf3ca6b7f6798409fb521fcf8782cfbe0
                                                                                                • Opcode Fuzzy Hash: cb680dc924ba5025bf93285b5d0e040889bf3cb8a34bbbdbb8d24ba11023098b
                                                                                                • Instruction Fuzzy Hash: 0C51B1B1D10349DFEB14CF99C994ADEBBB5BF48310F24812AE819AB210D7B5A945CF90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 254 59b18f0-59b1956 255 59b1958-59b195e 254->255 256 59b1961-59b1968 254->256 255->256 257 59b196a-59b1970 256->257 258 59b1973-59b1a12 CreateWindowExW 256->258 257->258 260 59b1a1b-59b1a53 258->260 261 59b1a14-59b1a1a 258->261 265 59b1a60 260->265 266 59b1a55-59b1a58 260->266 261->260 267 59b1a61 265->267 266->265 267->267
                                                                                                APIs
                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 059B1A02
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateWindow
                                                                                                • String ID:
                                                                                                • API String ID: 716092398-0
                                                                                                • Opcode ID: aac9e2f3b37aa6a720151c84f87a63f166a11b0d9fef481131cd6ed271b4c5ff
                                                                                                • Instruction ID: f48de0dd94b0610e2af698df410bd563a96fe333cf70d973d6de4a1928e2c6b1
                                                                                                • Opcode Fuzzy Hash: aac9e2f3b37aa6a720151c84f87a63f166a11b0d9fef481131cd6ed271b4c5ff
                                                                                                • Instruction Fuzzy Hash: 6B41B1B1D10349DFEB14CF99C994ADEBBB5BF48310F24812AE819AB210D7B5A945CF90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 268 5894248-58959d9 CreateActCtxA 271 58959db-58959e1 268->271 272 58959e2-5895a3c 268->272 271->272 279 5895a4b-5895a4f 272->279 280 5895a3e-5895a41 272->280 281 5895a51-5895a5d 279->281 282 5895a60 279->282 280->279 281->282 284 5895a61 282->284 284->284
                                                                                                APIs
                                                                                                • CreateActCtxA.KERNEL32(?), ref: 058959C9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Create
                                                                                                • String ID:
                                                                                                • API String ID: 2289755597-0
                                                                                                • Opcode ID: 5186c82cf21f245d9dc58ee13558e7923d3decbb3d03f7f43acadf41810221d4
                                                                                                • Instruction ID: 638eca6c870d2226f3707f362e9e673fc43fcd0fe36ffe94f950104c704b096a
                                                                                                • Opcode Fuzzy Hash: 5186c82cf21f245d9dc58ee13558e7923d3decbb3d03f7f43acadf41810221d4
                                                                                                • Instruction Fuzzy Hash: 1841EE70D0071DCBEB24DFA9C884B8DBBF5BF48304F24806AD408AB254DB716945CF91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 285 589590d-58959d9 CreateActCtxA 287 58959db-58959e1 285->287 288 58959e2-5895a3c 285->288 287->288 295 5895a4b-5895a4f 288->295 296 5895a3e-5895a41 288->296 297 5895a51-5895a5d 295->297 298 5895a60 295->298 296->295 297->298 300 5895a61 298->300 300->300
                                                                                                APIs
                                                                                                • CreateActCtxA.KERNEL32(?), ref: 058959C9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Create
                                                                                                • String ID:
                                                                                                • API String ID: 2289755597-0
                                                                                                • Opcode ID: 29ae1910218a0b58332fb31b337250baa2c784dca06c51478766c62fc6acbee1
                                                                                                • Instruction ID: 2cac6f63ea40c344f7a2d503cab88a082005676e348f006774742b9d85a3a7a7
                                                                                                • Opcode Fuzzy Hash: 29ae1910218a0b58332fb31b337250baa2c784dca06c51478766c62fc6acbee1
                                                                                                • Instruction Fuzzy Hash: 6A41EF70D00729CBEF29DFA9C884B8DBBF5BF89304F24816AD408AB254DB756946CF51

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 301 59b4050-59b408c 302 59b413c-59b415c 301->302 303 59b4092-59b4097 301->303 310 59b415f-59b416c 302->310 304 59b40ea-59b4122 CallWindowProcW 303->304 305 59b4099-59b40d0 303->305 306 59b412b-59b413a 304->306 307 59b4124-59b412a 304->307 312 59b40d9-59b40e8 305->312 313 59b40d2-59b40d8 305->313 306->310 307->306 312->310 313->312
                                                                                                APIs
                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 059B4111
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CallProcWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2714655100-0
                                                                                                • Opcode ID: b7c2fb0e8e2ba3b232f36aeb4e183d98b1114eefab43a923e0adb4b714465808
                                                                                                • Instruction ID: d61667f423aef0bb6efc2599321bd0be16d91714cd2c2a31fea9f49e039d811c
                                                                                                • Opcode Fuzzy Hash: b7c2fb0e8e2ba3b232f36aeb4e183d98b1114eefab43a923e0adb4b714465808
                                                                                                • Instruction Fuzzy Hash: D0413CB4900309DFEB14CF99C948AAABBF6FF88314F25C559D519AB321D375A841CFA0

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 315 59bbc48-59bbc9e 318 59bbcae-59bbced WriteProcessMemory 315->318 319 59bbca0-59bbcac 315->319 321 59bbcef-59bbcf5 318->321 322 59bbcf6-59bbd26 318->322 319->318 321->322
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 059BBCE0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 3bb05baa9c1b626aae9a9e351e8b097a98d775a1104f63dfdbedffad035eec4f
                                                                                                • Instruction ID: 2382ef7296f7ec49eb4b821cd787269c5469b878cdd25e442e6eec0d231ebefc
                                                                                                • Opcode Fuzzy Hash: 3bb05baa9c1b626aae9a9e351e8b097a98d775a1104f63dfdbedffad035eec4f
                                                                                                • Instruction Fuzzy Hash: C02126B1900349DFEB10DFAAC981BDEBBF5FF48310F108429E959A7240D7789944CBA4

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 326 59bbc50-59bbc9e 328 59bbcae-59bbced WriteProcessMemory 326->328 329 59bbca0-59bbcac 326->329 331 59bbcef-59bbcf5 328->331 332 59bbcf6-59bbd26 328->332 329->328 331->332
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 059BBCE0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: bbf0301e452ed53f2f0ba7a9f76797b609d94daedfd977f2e8098a5ae5325d74
                                                                                                • Instruction ID: bb3d06e7e4abd89fbbb16eb7b5a4c18fe0f9ab6f31b17652288812396df894cb
                                                                                                • Opcode Fuzzy Hash: bbf0301e452ed53f2f0ba7a9f76797b609d94daedfd977f2e8098a5ae5325d74
                                                                                                • Instruction Fuzzy Hash: 5C212671900349DFEB10DFAAC981BDEBBF5FF48310F108429E919A7240C7789944CBA4

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 342 59bbb71-59bbbc3 345 59bbbd3-59bbc03 Wow64SetThreadContext 342->345 346 59bbbc5-59bbbd1 342->346 348 59bbc0c-59bbc3c 345->348 349 59bbc05-59bbc0b 345->349 346->345 349->348
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 059BBBF6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: bbf84a40b2ee83ef4e9d9195e742ca1162c8d838e823d93ee02f41e48224fad5
                                                                                                • Instruction ID: 9cf0aeb95f8b3aeae2a007f195db523a66c427fe52ee59eb1afb0119035c1004
                                                                                                • Opcode Fuzzy Hash: bbf84a40b2ee83ef4e9d9195e742ca1162c8d838e823d93ee02f41e48224fad5
                                                                                                • Instruction Fuzzy Hash: A6213871D003099FEB10DFAAC9857EEBBF9EF88310F14842AD559A7241CB789944CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 336 589b730-589d6b4 DuplicateHandle 338 589d6bd-589d6da 336->338 339 589d6b6-589d6bc 336->339 339->338
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0589D5E6,?,?,?,?,?), ref: 0589D6A7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 528e411d83b881da65dacc5a0c27a13c0b8a706114cbfe4cf0fff50818388590
                                                                                                • Instruction ID: e2f82d770385fbbe005e26acc166832a4b9a146b143f9c46520702d4cbd00962
                                                                                                • Opcode Fuzzy Hash: 528e411d83b881da65dacc5a0c27a13c0b8a706114cbfe4cf0fff50818388590
                                                                                                • Instruction Fuzzy Hash: A721E5B5905248EFDF10CF9AD984ADEBBF9EB48310F14841AE918A7310D378A954CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 353 59bbb78-59bbbc3 355 59bbbd3-59bbc03 Wow64SetThreadContext 353->355 356 59bbbc5-59bbbd1 353->356 358 59bbc0c-59bbc3c 355->358 359 59bbc05-59bbc0b 355->359 356->355 359->358
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 059BBBF6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: 260b2150f22adb8bfcc3ae31b6ec5d31c98e9b7bcdb94e97cebe3e88770fa7bd
                                                                                                • Instruction ID: 18b3e64102c158673785957257411f85a4ec3da0afb782e36599b609eb2e4f06
                                                                                                • Opcode Fuzzy Hash: 260b2150f22adb8bfcc3ae31b6ec5d31c98e9b7bcdb94e97cebe3e88770fa7bd
                                                                                                • Instruction Fuzzy Hash: 94214971D003098FEB10DFAAC5857EEBBF9EF88310F14842AD519A7241CB789944CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 363 589d619-589d6b4 DuplicateHandle 364 589d6bd-589d6da 363->364 365 589d6b6-589d6bc 363->365 365->364
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0589D5E6,?,?,?,?,?), ref: 0589D6A7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 39e74df635121745cd691048dd3d72fdb870d0c3bd81bd9001ef69baf6860c73
                                                                                                • Instruction ID: 951034e687ffb711afb6ce8696f65eee77190c463d3bd51ff82b14ab71a1c85f
                                                                                                • Opcode Fuzzy Hash: 39e74df635121745cd691048dd3d72fdb870d0c3bd81bd9001ef69baf6860c73
                                                                                                • Instruction Fuzzy Hash: D12103B5D00249DFDB10CFAAD984ADEBBF4EB48310F14801AE918A7310D378A944CFA4
                                                                                                APIs
                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002), ref: 059BCDF9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessRead
                                                                                                • String ID:
                                                                                                • API String ID: 1726664587-0
                                                                                                • Opcode ID: f28d80c5d46ace88977218f9d523c2b713fe58ff01d8f49374a89c6671bd9b9e
                                                                                                • Instruction ID: 98ffc9707a960d14421843a57810f037632bd176e9e4f81f20e7033113e3aa98
                                                                                                • Opcode Fuzzy Hash: f28d80c5d46ace88977218f9d523c2b713fe58ff01d8f49374a89c6671bd9b9e
                                                                                                • Instruction Fuzzy Hash: 6C21E3B5800349DFDB10CF9AC985ADEFBF8FB48310F10852AE958A7210D378A944CFA5
                                                                                                APIs
                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002), ref: 059BCDF9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessRead
                                                                                                • String ID:
                                                                                                • API String ID: 1726664587-0
                                                                                                • Opcode ID: e24843bc2d0c36b14e4fbd7a7523c94588f3e674a92481fb07d5c4a4b8f922e0
                                                                                                • Instruction ID: 9b59ffc9cf98c4cfb6918cbe84f8eb90963d977a43933b6d2991c45860c006c7
                                                                                                • Opcode Fuzzy Hash: e24843bc2d0c36b14e4fbd7a7523c94588f3e674a92481fb07d5c4a4b8f922e0
                                                                                                • Instruction Fuzzy Hash: 8321E5B5800349DFDB10CF9AC985ADEFBF8FB48310F10852AE958A7200D379A944CFA5
                                                                                                APIs
                                                                                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 059BCD3B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: 42c13d94f5b335ecb2b462b6921b63c5d353488e93d8ef803937d4477e74ff36
                                                                                                • Instruction ID: 012838c2004536f0a08188545ca1c1ddb786dc35f1446228b7e3fb8a2f3656d3
                                                                                                • Opcode Fuzzy Hash: 42c13d94f5b335ecb2b462b6921b63c5d353488e93d8ef803937d4477e74ff36
                                                                                                • Instruction Fuzzy Hash: E31156B5C0434A8FEB10CF9AC945BDEBBF8EB88210F148429E458A3200D378A944CFA5
                                                                                                APIs
                                                                                                • PostMessageW.USER32(?,?,?,?), ref: 097D05E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePost
                                                                                                • String ID:
                                                                                                • API String ID: 410705778-0
                                                                                                • Opcode ID: 5868dfb31b36cc91e1c4c846f0b647893c2df88da7d555a0dfcd742e74561565
                                                                                                • Instruction ID: cfb75ebdbc3035993a5d6d48c8aa6907cc81bff658808b2779931560a976eb33
                                                                                                • Opcode Fuzzy Hash: 5868dfb31b36cc91e1c4c846f0b647893c2df88da7d555a0dfcd742e74561565
                                                                                                • Instruction Fuzzy Hash: 5D218BB1808389CFDB11CFA9C845B9EBFF4EB09310F15849AD584A7692C378A544CF65
                                                                                                APIs
                                                                                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 059BCD3B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: be72d0fd25fa6ea90d5c6f48a2805ee5dc64cb30d6999210329edbea5cf274aa
                                                                                                • Instruction ID: 243d7958610f261913b109b02ac26c1e6cddfc638235de5e568a3fbd9c0c6eb5
                                                                                                • Opcode Fuzzy Hash: be72d0fd25fa6ea90d5c6f48a2805ee5dc64cb30d6999210329edbea5cf274aa
                                                                                                • Instruction Fuzzy Hash: B71126B5D042498FEB10CF9AC945BDEBBF8EB88210F158129D458A3200D378A545CFA5
                                                                                                APIs
                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 059BBDAE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: ef87d59a8f80e68c5e61b4931d3a47c2d2715d3a80b8789b58f284b57e881bed
                                                                                                • Instruction ID: 0d5a5b23d1370cf84ecae3caf14a1239adccbe8ef70e092ef1b465498411f75c
                                                                                                • Opcode Fuzzy Hash: ef87d59a8f80e68c5e61b4931d3a47c2d2715d3a80b8789b58f284b57e881bed
                                                                                                • Instruction Fuzzy Hash: 421144728003499FEF10DFAAC845BDEBBF5EF88310F148819E519A7250C7799940CFA4
                                                                                                APIs
                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 059BBDAE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 772dd8babb128fb8344c707f997493ea023ff93a9a417b9d036b0194e1358592
                                                                                                • Instruction ID: e13f5dae3c6c0fe8b544428daaeba1b2b7de8278b18eaae6329a1e3ec38a79ba
                                                                                                • Opcode Fuzzy Hash: 772dd8babb128fb8344c707f997493ea023ff93a9a417b9d036b0194e1358592
                                                                                                • Instruction Fuzzy Hash: A11126719003499FEF10DFAAC845BDEBBF5EF88310F148419E515A7250C7799940CFA5
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: 76baae00d6cc793d3db9ab96c24f7036299091ae67470ef063f48524566fae56
                                                                                                • Instruction ID: 228dd91570096fde6e7c675d0edd8dcefef3c3e420e08712e47dfadcacf92a8d
                                                                                                • Opcode Fuzzy Hash: 76baae00d6cc793d3db9ab96c24f7036299091ae67470ef063f48524566fae56
                                                                                                • Instruction Fuzzy Hash: 41115871900349CFEB10DFAAC8457DFFBF9EF88620F248419D519A7240C779A944CBA4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ResumeThread
                                                                                                • String ID:
                                                                                                • API String ID: 947044025-0
                                                                                                • Opcode ID: f7cc4b73a2e62e5b5fb5fc32edde3048da651283938475d0c20d73b72af0616c
                                                                                                • Instruction ID: 90ad286277c5275c8a4d9531e90d095326d759fb171d2974d989da7b809237a6
                                                                                                • Opcode Fuzzy Hash: f7cc4b73a2e62e5b5fb5fc32edde3048da651283938475d0c20d73b72af0616c
                                                                                                • Instruction Fuzzy Hash: 98115871900349CFEB10DFAAC4457DEFBF9AF88610F208419D519A7240C779A940CBA4
                                                                                                APIs
                                                                                                • PostMessageW.USER32(?,?,?,?), ref: 097D05E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePost
                                                                                                • String ID:
                                                                                                • API String ID: 410705778-0
                                                                                                • Opcode ID: f213c3a13b0d492d1af01699e797c01cd5a8773262d595fd7e73c961b76a6571
                                                                                                • Instruction ID: a1786a695253e4bd974c069fd0413608b773918bf66ce11084603c7e1a483b81
                                                                                                • Opcode Fuzzy Hash: f213c3a13b0d492d1af01699e797c01cd5a8773262d595fd7e73c961b76a6571
                                                                                                • Instruction Fuzzy Hash: 401106B5800349DFDB10CF9AC845BDEFBF8EB48320F108429E954A7240D379A944CFA5
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0589AF9E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 4139908857-0
                                                                                                • Opcode ID: 2ae4157654d9d28610f8a26b9667bf2008887be276700044556538dc06c50c63
                                                                                                • Instruction ID: 9c4e8718c093629fdf5687799c1254c82de8d3fca6b1759e30b4c7e727e50267
                                                                                                • Opcode Fuzzy Hash: 2ae4157654d9d28610f8a26b9667bf2008887be276700044556538dc06c50c63
                                                                                                • Instruction Fuzzy Hash: 651110B6C04749CFDB18CF9AC444ADEFBF4EB88214F14842AD819A7200D379A945CFA1
                                                                                                APIs
                                                                                                • OleInitialize.OLE32(00000000), ref: 097D1F1D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: 623648275866a8fcf2901aa5ced5dba2fed379a7bd2297ef75fde5ab22f2d036
                                                                                                • Instruction ID: 8e44855585fff37a99e3fde815be8255fe02d88122fddfc89f29d92db858814a
                                                                                                • Opcode Fuzzy Hash: 623648275866a8fcf2901aa5ced5dba2fed379a7bd2297ef75fde5ab22f2d036
                                                                                                • Instruction Fuzzy Hash: B01115B5904748DFDB20DF9AD584B9EBBF8EB48310F208459E519A7300D379A944CFA5
                                                                                                APIs
                                                                                                • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,097D99A7), ref: 097DA445
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: DispatchMessage
                                                                                                • String ID:
                                                                                                • API String ID: 2061451462-0
                                                                                                • Opcode ID: f8c236a5de5d259c7ab632b52abee422fc8cfa22676db2bd3ff5e1f68a7fc70c
                                                                                                • Instruction ID: 12df454b101aaefdcf4a09d8f70dd49b7d080224ff1f01797d62beef5b371ec2
                                                                                                • Opcode Fuzzy Hash: f8c236a5de5d259c7ab632b52abee422fc8cfa22676db2bd3ff5e1f68a7fc70c
                                                                                                • Instruction Fuzzy Hash: 1611EDB1C04749CFCB24DF9AD488B9EFBF8EB48310F10852AE918A7200D379A544CFA5
                                                                                                APIs
                                                                                                • OleInitialize.OLE32(00000000), ref: 097D1F1D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: 2cae6d80020bafc9c2903d8f68633c21dcebea15ff570949d5a62b363a19ac6a
                                                                                                • Instruction ID: 2fbed8d2543c7a69db30b25c875540ee1c9f6a90e775dab981af2521d09761be
                                                                                                • Opcode Fuzzy Hash: 2cae6d80020bafc9c2903d8f68633c21dcebea15ff570949d5a62b363a19ac6a
                                                                                                • Instruction Fuzzy Hash: 241115B5804348CFDB10DF9AD485BDEBBF8EB48310F208419E559A7300C379A544CFA5
                                                                                                APIs
                                                                                                • SetWindowLongW.USER32(?,?,?), ref: 059B1B95
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: LongWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1378638983-0
                                                                                                • Opcode ID: 2e4e84b1160316f6028dde11b752191e1e936c1254bda573b4f99e0548e1437c
                                                                                                • Instruction ID: eb898e1bc5ce252f2f7ee67d8da15bd89694f0b5c808fdbc9c9069f6f45b88f2
                                                                                                • Opcode Fuzzy Hash: 2e4e84b1160316f6028dde11b752191e1e936c1254bda573b4f99e0548e1437c
                                                                                                • Instruction Fuzzy Hash: 8E11F5B5800349DFDB10DF99C585BDEBBF8EB48310F108419D555A7300D375A944CFA5
                                                                                                APIs
                                                                                                • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,097D99A7), ref: 097DA445
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4579601407.00000000097D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 097D0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_97d0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: DispatchMessage
                                                                                                • String ID:
                                                                                                • API String ID: 2061451462-0
                                                                                                • Opcode ID: 3c3521cad35f3ef7e1ca3a6f7aceada208ff7c2d95f8b56583b3742ede337844
                                                                                                • Instruction ID: 2bdb62dcb1dd96e7f0e946fab0f3b0cc093789521950c106b30f46cf2a1ad654
                                                                                                • Opcode Fuzzy Hash: 3c3521cad35f3ef7e1ca3a6f7aceada208ff7c2d95f8b56583b3742ede337844
                                                                                                • Instruction Fuzzy Hash: D911FEB5C04649CFCB24DF9AD844BCEFBF8EB48314F10852AE518A3240D378A544CFA5
                                                                                                APIs
                                                                                                • SetWindowLongW.USER32(?,?,?), ref: 059B1B95
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: LongWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1378638983-0
                                                                                                • Opcode ID: d2b5f837349b0f6d1859ff3465358a271d641a3a3451620ea3d57a3a62bd22df
                                                                                                • Instruction ID: c29ef886434ab03036def6ea7915f1a67ac4cf5af6434a2c83e78b21ea6bf43c
                                                                                                • Opcode Fuzzy Hash: d2b5f837349b0f6d1859ff3465358a271d641a3a3451620ea3d57a3a62bd22df
                                                                                                • Instruction Fuzzy Hash: 791103B5800349DFEB10DF9AC585BDEBBF8EB88320F20841AD918A7300D375A944CFA5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4574349770.00000000031BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031BD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_31bd000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b95dfad81e5f5eeb7d7a6c3e7332ea20ddbbcc6c926727d01816435e59f9ed6e
                                                                                                • Instruction ID: e19f7632acfae397b2d2ac58ba063e0ca0d32850b23e58252078a756961869ba
                                                                                                • Opcode Fuzzy Hash: b95dfad81e5f5eeb7d7a6c3e7332ea20ddbbcc6c926727d01816435e59f9ed6e
                                                                                                • Instruction Fuzzy Hash: 2621D671504204EFDB09DF14E9C0B56FB75FB88314F24C5A9E9094B656C336E456CAA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4574577640.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_31cd000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a29cf821e8ca3584fdebdecaa31f27b19012f97f334067e0735caf8dd7a012d4
                                                                                                • Instruction ID: fc6d8a159faa4ad2271bb6e02f7b9f0146b998f5821293a77d3c366b6ae2b7d2
                                                                                                • Opcode Fuzzy Hash: a29cf821e8ca3584fdebdecaa31f27b19012f97f334067e0735caf8dd7a012d4
                                                                                                • Instruction Fuzzy Hash: C3210771614384EFDB14DF28E5C0B16BB65FB98314F24C5BDD90A4B246C336D457CA62
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4574577640.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_31cd000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4f87b014c607e6987dfd2983e7aa7d0e49e4fc9676d63a871b2605639eb69d32
                                                                                                • Instruction ID: 25dd86914f1301c8021fb495307281f852e251fbc95b5464fc2279952459bcc8
                                                                                                • Opcode Fuzzy Hash: 4f87b014c607e6987dfd2983e7aa7d0e49e4fc9676d63a871b2605639eb69d32
                                                                                                • Instruction Fuzzy Hash: 7C2108B5514284EFDB04DF14E9C0B2AFB65FB9C324F24C5BED8490B242C37AD446CAA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4574577640.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_31cd000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c8f292854e2ea5f0c874b024747fe3e8ce27a0c6ccc317b015c292a2b742a930
                                                                                                • Instruction ID: cc11312438493f9cd200eeceab3deb3a6dff613607c626557888bddf4f6c5111
                                                                                                • Opcode Fuzzy Hash: c8f292854e2ea5f0c874b024747fe3e8ce27a0c6ccc317b015c292a2b742a930
                                                                                                • Instruction Fuzzy Hash: 512192755083C0DFCB02CF24D994715BF71EB4A214F28C5EAD8498F2A7C33A981ACB62
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4574349770.00000000031BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031BD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_31bd000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                                                                                • Instruction ID: 2b952fcb17bd7e05ca7fef78a13e09c81e1ee950a8f2718113a3492ea921c59e
                                                                                                • Opcode Fuzzy Hash: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                                                                                • Instruction Fuzzy Hash: 1711D376504240DFCB15CF10D5C4B56FF71FB88324F28C6A9D8094B656C33AE45ACBA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4574577640.00000000031CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 031CD000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_31cd000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 13a17b32a4d52625cadd0f9ecc214952461d3c7e875772a6c7a986913f5e1172
                                                                                                • Instruction ID: 1ab0d55c75499c78888557abd24673b99ce0a6508941455cd80c1dcf01a72cdb
                                                                                                • Opcode Fuzzy Hash: 13a17b32a4d52625cadd0f9ecc214952461d3c7e875772a6c7a986913f5e1172
                                                                                                • Instruction Fuzzy Hash: F31182B5504684DFDB11CF14E5C4B19FF61FB88324F28C6AED8494B656C33AD44ACBA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6a7740578d1b2abeffac443357b628570fa112e6c16d7d4840d5e6f37156257d
                                                                                                • Instruction ID: d0bbd733aead09b39104bf8585453bda690d37059b040e92b44fa9db7f03f69c
                                                                                                • Opcode Fuzzy Hash: 6a7740578d1b2abeffac443357b628570fa112e6c16d7d4840d5e6f37156257d
                                                                                                • Instruction Fuzzy Hash: 5012B7B0423B458BE310EF25E84E9993FB1B749318F514329EA625F2E5DFB8214ACF44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4577664279.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5890000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9cef63092aaddd78f38ef63fbea52a72137328739bd9df162d078351b5a828b2
                                                                                                • Instruction ID: 0aaaddbfef175f446fe412eece0c97421517c051ce4e50c9092b4feb4f2c06fd
                                                                                                • Opcode Fuzzy Hash: 9cef63092aaddd78f38ef63fbea52a72137328739bd9df162d078351b5a828b2
                                                                                                • Instruction Fuzzy Hash: 72A15035A002099FCF0EDFB4C84499EBBB6FF85300B19856AE906EB255DB71ED55CB40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.4578247119.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_59b0000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7777d81170e7105b96b11ddd70da320956d16cdd5ca2376aa6d5825dc2539c3f
                                                                                                • Instruction ID: a57e27794f0b1d98f37bfe760a39afd6874119bf5722a444bada10c978dab6fa
                                                                                                • Opcode Fuzzy Hash: 7777d81170e7105b96b11ddd70da320956d16cdd5ca2376aa6d5825dc2539c3f
                                                                                                • Instruction Fuzzy Hash: B0C13DB04227458FE710DF24E84A9993FB1BB89318F514329EA626F2E1DFB4354ACF44

                                                                                                Execution Graph

                                                                                                Execution Coverage:4.8%
                                                                                                Dynamic/Decrypted Code Coverage:4.1%
                                                                                                Signature Coverage:6.7%
                                                                                                Total number of Nodes:1700
                                                                                                Total number of Limit Nodes:45
                                                                                                execution_graph 52700 415836 52711 401d64 52700->52711 52702 41584b 52716 401fbd 52702->52716 52705 401d64 28 API calls 52706 415863 52705->52706 52707 401fbd 28 API calls 52706->52707 52708 41586b 52707->52708 52720 411bc5 52708->52720 52712 401d6c 52711->52712 52714 401d74 52712->52714 52739 401fff 28 API calls 52712->52739 52714->52702 52717 401fcc 52716->52717 52740 402501 52717->52740 52719 401fea 52719->52705 52745 4041f1 52720->52745 52722 411bd9 52752 40428c connect 52722->52752 52726 411bfa 52816 4027cb 52726->52816 52728 411c04 52819 404468 52728->52819 52732 411c16 52838 4045d5 52732->52838 52735 401eea 26 API calls 52736 411c2c 52735->52736 52737 401eea 26 API calls 52736->52737 52738 411c34 52737->52738 52741 40250d 52740->52741 52743 40252b 52741->52743 52744 40261a 28 API calls 52741->52744 52743->52719 52744->52743 52746 404206 socket 52745->52746 52747 4041fd 52745->52747 52749 404220 52746->52749 52750 404224 CreateEventW 52746->52750 52853 404262 WSAStartup 52747->52853 52749->52722 52750->52722 52751 404202 52751->52746 52751->52749 52753 4043e1 52752->52753 52754 4042b3 52752->52754 52755 404343 52753->52755 52756 4043e7 WSAGetLastError 52753->52756 52754->52755 52757 4042e8 52754->52757 52854 404cbf 52754->52854 52812 4027ec 52755->52812 52756->52755 52758 4043f7 52756->52758 52886 42035c 27 API calls 52757->52886 52761 4042f7 52758->52761 52762 4043fc 52758->52762 52768 401f66 28 API calls 52761->52768 52891 41be81 30 API calls 52762->52891 52763 4042f0 52763->52761 52767 404306 52763->52767 52764 4042d4 52858 401f66 52764->52858 52766 40440b 52892 404c9e 28 API calls 52766->52892 52777 404315 52767->52777 52778 40434c 52767->52778 52771 404448 52768->52771 52775 401f66 28 API calls 52771->52775 52774 404418 52776 401f66 28 API calls 52774->52776 52779 404457 52775->52779 52780 404427 52776->52780 52782 401f66 28 API calls 52777->52782 52888 42113f 56 API calls 52778->52888 52783 41a891 79 API calls 52779->52783 52784 41a891 79 API calls 52780->52784 52786 404324 52782->52786 52783->52755 52787 40442c 52784->52787 52785 404354 52788 404389 52785->52788 52789 404359 52785->52789 52790 401f66 28 API calls 52786->52790 52792 401eea 26 API calls 52787->52792 52890 4204f5 28 API calls 52788->52890 52793 401f66 28 API calls 52789->52793 52794 404333 52790->52794 52792->52755 52796 404368 52793->52796 52797 41a891 79 API calls 52794->52797 52795 404391 52798 4043be CreateEventW CreateEventW 52795->52798 52801 401f66 28 API calls 52795->52801 52799 401f66 28 API calls 52796->52799 52800 404338 52797->52800 52798->52755 52802 404377 52799->52802 52887 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52800->52887 52804 4043a7 52801->52804 52805 41a891 79 API calls 52802->52805 52806 401f66 28 API calls 52804->52806 52807 40437c 52805->52807 52808 4043b6 52806->52808 52889 42079d 54 API calls 52807->52889 52810 41a891 79 API calls 52808->52810 52811 4043bb 52810->52811 52811->52798 52813 4027f8 52812->52813 52814 402e78 28 API calls 52813->52814 52815 402814 52814->52815 52815->52726 52924 401e9b 52816->52924 52818 4027d9 52818->52728 52820 40447b 52819->52820 52928 404be8 52820->52928 52822 404490 ctype 52823 404507 WaitForSingleObject 52822->52823 52824 4044e7 52822->52824 52825 40451d 52823->52825 52826 4044f9 send 52824->52826 52932 420725 56 API calls 52825->52932 52827 404542 52826->52827 52830 401eea 26 API calls 52827->52830 52829 404530 SetEvent 52829->52827 52831 40454a 52830->52831 52832 401eea 26 API calls 52831->52832 52833 404552 52832->52833 52834 401eea 52833->52834 52835 4021b9 52834->52835 52836 4021e8 52835->52836 52938 40262e 52835->52938 52836->52732 52845 4045ec 52838->52845 52842 404666 52980 4047eb WaitForSingleObject 52842->52980 52845->52842 52847 401eea 26 API calls 52845->52847 52946 43aa9c 52845->52946 52953 40455b 52845->52953 52959 401f86 52845->52959 52963 401eef 52845->52963 52967 404688 52845->52967 52847->52845 52848 401eea 26 API calls 52849 404676 52848->52849 52850 401eea 26 API calls 52849->52850 52851 40467f 52850->52851 52851->52735 52853->52751 52855 404ccb 52854->52855 52893 402e78 52855->52893 52857 404cee 52857->52764 52859 401f6e 52858->52859 52902 402301 52859->52902 52862 41a891 52863 41a942 52862->52863 52864 41a8a7 GetLocalTime 52862->52864 52866 401eea 26 API calls 52863->52866 52865 404cbf 28 API calls 52864->52865 52867 41a8e9 52865->52867 52868 41a94a 52866->52868 52911 405ce6 52867->52911 52870 401eea 26 API calls 52868->52870 52872 41a952 52870->52872 52871 41a8f5 52873 4027cb 28 API calls 52871->52873 52872->52757 52874 41a901 52873->52874 52875 405ce6 28 API calls 52874->52875 52876 41a90d 52875->52876 52914 406478 76 API calls 52876->52914 52878 41a91b 52879 401eea 26 API calls 52878->52879 52880 41a927 52879->52880 52881 401eea 26 API calls 52880->52881 52882 41a930 52881->52882 52883 401eea 26 API calls 52882->52883 52884 41a939 52883->52884 52885 401eea 26 API calls 52884->52885 52885->52863 52886->52763 52887->52755 52888->52785 52889->52800 52890->52795 52891->52766 52892->52774 52894 402e85 52893->52894 52895 402e98 52894->52895 52897 402ea9 52894->52897 52898 402eae 52894->52898 52900 403445 28 API calls 52895->52900 52897->52857 52898->52897 52901 40225b 26 API calls 52898->52901 52900->52897 52901->52897 52903 40230d 52902->52903 52906 402325 52903->52906 52905 401f80 52905->52862 52907 40232f 52906->52907 52909 40233a 52907->52909 52910 40294a 28 API calls 52907->52910 52909->52905 52910->52909 52915 404bc4 52911->52915 52913 405cf4 52913->52871 52914->52878 52916 404bd0 52915->52916 52919 40245c 52916->52919 52918 404be4 52918->52913 52920 402469 52919->52920 52922 402478 52920->52922 52923 402ad3 28 API calls 52920->52923 52922->52918 52923->52922 52925 401ea7 52924->52925 52926 40245c 28 API calls 52925->52926 52927 401eb9 52926->52927 52927->52818 52929 404bf0 52928->52929 52933 404c0c 52929->52933 52931 404c06 52931->52822 52932->52829 52934 404c16 52933->52934 52936 404c21 52934->52936 52937 404d07 28 API calls 52934->52937 52936->52931 52937->52936 52941 402bee 52938->52941 52940 40263b 52940->52836 52942 402bfb 52941->52942 52944 402c08 _Deallocate 52941->52944 52945 4015d8 26 API calls _Deallocate 52942->52945 52944->52940 52945->52944 52951 446d0f _strftime 52946->52951 52947 446d4d 52994 445564 20 API calls __dosmaperr 52947->52994 52948 446d38 RtlAllocateHeap 52950 446d4b 52948->52950 52948->52951 52950->52845 52951->52947 52951->52948 52993 442410 7 API calls 2 library calls 52951->52993 52954 404592 recv 52953->52954 52955 404565 WaitForSingleObject 52953->52955 52957 4045a5 52954->52957 52995 420761 56 API calls 52955->52995 52957->52845 52958 404581 SetEvent 52958->52957 52960 401f8e 52959->52960 52961 402325 28 API calls 52960->52961 52962 401fa4 52961->52962 52962->52845 52964 401efe 52963->52964 52965 401f0a 52964->52965 52996 4021b9 52964->52996 52965->52845 52974 4046a3 52967->52974 52968 4047d8 52969 401eea 26 API calls 52968->52969 52970 4047e1 52969->52970 52970->52845 52971 403b60 28 API calls 52971->52974 52972 401eef 26 API calls 52972->52974 52973 401eea 26 API calls 52973->52974 52974->52968 52974->52971 52974->52972 52974->52973 52975 401fbd 28 API calls 52974->52975 53000 402654 52974->53000 53003 411c38 52974->53003 53047 401ebd 52974->53047 52975->52974 52981 404805 SetEvent CloseHandle 52980->52981 52982 40481c closesocket 52980->52982 52983 40466d 52981->52983 52984 404829 52982->52984 52983->52848 52985 40483f 52984->52985 53571 404ab1 83 API calls 52984->53571 52987 404851 WaitForSingleObject 52985->52987 52988 404892 SetEvent CloseHandle 52985->52988 53572 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52987->53572 52988->52983 52990 404860 SetEvent WaitForSingleObject 53573 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52990->53573 52992 404878 SetEvent CloseHandle CloseHandle 52992->52988 52993->52951 52994->52950 52995->52958 52998 4021c6 52996->52998 52997 4021e8 52997->52965 52998->52997 52999 40262e 26 API calls 52998->52999 52999->52997 53051 402c1a 53000->53051 53004 411c4a 53003->53004 53064 403b60 53004->53064 53007 401fbd 28 API calls 53008 411c6c 53007->53008 53009 401fbd 28 API calls 53008->53009 53010 411c7b 53009->53010 53067 41b1ce 53010->53067 53013 411d38 53230 401d8c 53013->53230 53015 401d64 28 API calls 53017 411ca0 53015->53017 53016 411d41 53018 401eea 26 API calls 53016->53018 53019 401fbd 28 API calls 53017->53019 53020 411d4a 53018->53020 53021 411ca8 53019->53021 53022 401eea 26 API calls 53020->53022 53023 401d64 28 API calls 53021->53023 53025 411d52 53022->53025 53024 411cb8 53023->53024 53026 401fbd 28 API calls 53024->53026 53025->52974 53027 411cc0 53026->53027 53028 401d64 28 API calls 53027->53028 53029 411cd0 53028->53029 53030 401fbd 28 API calls 53029->53030 53031 411cd8 53030->53031 53032 401d64 28 API calls 53031->53032 53033 411ce8 53032->53033 53034 401fbd 28 API calls 53033->53034 53035 411cf0 53034->53035 53036 401d64 28 API calls 53035->53036 53037 411d00 53036->53037 53038 401fbd 28 API calls 53037->53038 53039 411d08 53038->53039 53040 401d64 28 API calls 53039->53040 53041 411d1b 53040->53041 53042 401fbd 28 API calls 53041->53042 53043 411d23 53042->53043 53088 411d59 GetModuleFileNameW 53043->53088 53046 4047eb 98 API calls 53046->53013 53049 401ec9 53047->53049 53048 401ee4 CreateEventA CreateThread WaitForSingleObject CloseHandle 53048->52974 53424 414d2d 53048->53424 53049->53048 53050 402325 28 API calls 53049->53050 53050->53048 53054 403340 53051->53054 53056 403348 53054->53056 53055 402662 53055->52974 53056->53055 53058 4038c2 53056->53058 53061 4038cb 53058->53061 53062 401eea 26 API calls 53061->53062 53063 4038ca 53062->53063 53063->53056 53236 403c30 53064->53236 53087 41b1e1 53067->53087 53068 41b251 53069 401eea 26 API calls 53068->53069 53070 41b283 53069->53070 53071 401eea 26 API calls 53070->53071 53073 41b28b 53071->53073 53072 41b253 53074 403b60 28 API calls 53072->53074 53076 401eea 26 API calls 53073->53076 53077 41b25f 53074->53077 53075 403b60 28 API calls 53075->53087 53078 411c84 53076->53078 53079 401eef 26 API calls 53077->53079 53078->53013 53078->53015 53081 41b268 53079->53081 53080 401eef 26 API calls 53080->53087 53082 401eea 26 API calls 53081->53082 53084 41b270 53082->53084 53083 401eea 26 API calls 53083->53087 53253 41c1b4 28 API calls 53084->53253 53087->53068 53087->53072 53087->53075 53087->53080 53087->53083 53252 41c1b4 28 API calls 53087->53252 53092 411d84 53088->53092 53089 41ad43 42 API calls 53089->53092 53090 40c854 32 API calls 53090->53092 53091 401eea 26 API calls 53091->53092 53092->53089 53092->53090 53092->53091 53093 403cdc 28 API calls 53092->53093 53094 4028cf 28 API calls 53092->53094 53095 411ec2 Sleep 53092->53095 53096 403b40 28 API calls 53092->53096 53097 41789c 31 API calls 53092->53097 53098 411f64 Sleep 53092->53098 53099 403cbb 28 API calls 53092->53099 53100 401e13 26 API calls 53092->53100 53101 412006 Sleep 53092->53101 53102 412068 DeleteFileW 53092->53102 53103 41b825 32 API calls 53092->53103 53104 41209f DeleteFileW 53092->53104 53105 4120f1 Sleep 53092->53105 53106 4120db DeleteFileW 53092->53106 53107 41216a 53092->53107 53114 412136 Sleep 53092->53114 53093->53092 53094->53092 53095->53092 53096->53092 53097->53092 53098->53092 53099->53092 53100->53092 53101->53092 53102->53092 53103->53092 53104->53092 53105->53092 53106->53092 53108 401e13 26 API calls 53107->53108 53109 412176 53108->53109 53110 401e13 26 API calls 53109->53110 53111 412182 53110->53111 53112 401e13 26 API calls 53111->53112 53113 41218e 53112->53113 53254 40b027 53113->53254 53116 401e13 26 API calls 53114->53116 53121 412146 53116->53121 53117 4121a1 53119 401fbd 28 API calls 53117->53119 53118 401e13 26 API calls 53118->53121 53120 4121c1 53119->53120 53258 4124cf 53120->53258 53121->53092 53121->53118 53123 412168 53121->53123 53123->53113 53126 4121d8 53127 4121fd 53126->53127 53128 41234c 53126->53128 53130 41b0d3 28 API calls 53127->53130 53274 41b0d3 53128->53274 53132 412209 53130->53132 53285 41af51 53132->53285 53134 4027ec 28 API calls 53135 41238a 53134->53135 53137 4027cb 28 API calls 53135->53137 53139 412399 53137->53139 53138 4027ec 28 API calls 53140 41224e 53138->53140 53141 4027cb 28 API calls 53139->53141 53142 4027cb 28 API calls 53140->53142 53143 4123a5 53141->53143 53144 41225d 53142->53144 53145 4027cb 28 API calls 53143->53145 53146 4027cb 28 API calls 53144->53146 53147 4123b4 53145->53147 53148 41226c 53146->53148 53149 4027cb 28 API calls 53147->53149 53150 4027cb 28 API calls 53148->53150 53151 4123c3 53149->53151 53152 41227b 53150->53152 53153 4027cb 28 API calls 53151->53153 53154 4027cb 28 API calls 53152->53154 53155 4123d2 53153->53155 53156 41228a 53154->53156 53157 4027cb 28 API calls 53155->53157 53158 4027cb 28 API calls 53156->53158 53159 4123e1 53157->53159 53160 412296 53158->53160 53278 40275c 53159->53278 53162 4027cb 28 API calls 53160->53162 53164 4122a2 53162->53164 53163 4123eb 53166 404468 60 API calls 53163->53166 53165 40275c 28 API calls 53164->53165 53168 4122b1 53165->53168 53167 4123f8 53166->53167 53169 401eea 26 API calls 53167->53169 53170 4027cb 28 API calls 53168->53170 53171 412404 53169->53171 53172 4122bd 53170->53172 53173 401eea 26 API calls 53171->53173 53174 40275c 28 API calls 53172->53174 53175 412410 53173->53175 53176 4122c7 53174->53176 53177 401eea 26 API calls 53175->53177 53178 404468 60 API calls 53176->53178 53179 41241c 53177->53179 53180 4122d4 53178->53180 53181 401eea 26 API calls 53179->53181 53182 401eea 26 API calls 53180->53182 53183 412428 53181->53183 53184 4122dd 53182->53184 53185 401eea 26 API calls 53183->53185 53186 401eea 26 API calls 53184->53186 53187 412431 53185->53187 53188 4122e6 53186->53188 53189 401eea 26 API calls 53187->53189 53190 401eea 26 API calls 53188->53190 53191 41243a 53189->53191 53192 4122ef 53190->53192 53193 401eea 26 API calls 53191->53193 53194 401eea 26 API calls 53192->53194 53195 412340 53193->53195 53196 4122f8 53194->53196 53198 401eea 26 API calls 53195->53198 53197 401eea 26 API calls 53196->53197 53199 412304 53197->53199 53200 41244c 53198->53200 53201 401eea 26 API calls 53199->53201 53202 401e13 26 API calls 53200->53202 53203 412310 53201->53203 53204 412458 53202->53204 53205 401eea 26 API calls 53203->53205 53206 401eea 26 API calls 53204->53206 53207 41231c 53205->53207 53208 412464 53206->53208 53209 401eea 26 API calls 53207->53209 53210 401eea 26 API calls 53208->53210 53211 412328 53209->53211 53212 412470 53210->53212 53213 401eea 26 API calls 53211->53213 53214 401eea 26 API calls 53212->53214 53215 412334 53213->53215 53216 41247c 53214->53216 53217 401eea 26 API calls 53215->53217 53218 401eea 26 API calls 53216->53218 53217->53195 53219 412488 53218->53219 53220 401eea 26 API calls 53219->53220 53221 412494 53220->53221 53222 401eea 26 API calls 53221->53222 53223 4124a0 53222->53223 53224 401eea 26 API calls 53223->53224 53225 4124ac 53224->53225 53226 401eea 26 API calls 53225->53226 53227 4124b8 53226->53227 53228 401eea 26 API calls 53227->53228 53229 411d28 53228->53229 53229->53046 53231 40200a 53230->53231 53232 402654 26 API calls 53231->53232 53235 40203a 53231->53235 53233 40202b 53232->53233 53423 4026ba 26 API calls _Deallocate 53233->53423 53235->53016 53237 403c39 53236->53237 53240 403c59 53237->53240 53241 403c68 53240->53241 53246 4032a4 53241->53246 53243 403c74 53244 402325 28 API calls 53243->53244 53245 403b73 53244->53245 53245->53007 53247 4032b0 53246->53247 53248 4032ad 53246->53248 53251 4032b6 28 API calls 53247->53251 53248->53243 53252->53087 53253->53068 53255 40b02f 53254->53255 53290 40b04b 53255->53290 53257 40b045 53257->53117 53259 41250d 53258->53259 53261 4124de 53258->53261 53260 41251c 53259->53260 53302 10001c5b 53259->53302 53298 403b40 53260->53298 53295 410be5 53261->53295 53266 401eea 26 API calls 53268 4121cc 53266->53268 53270 401e13 53268->53270 53272 402121 53270->53272 53271 402150 53271->53126 53272->53271 53409 402718 26 API calls _Deallocate 53272->53409 53275 41b0e0 53274->53275 53276 401f86 28 API calls 53275->53276 53277 412355 53276->53277 53277->53134 53281 40276b 53278->53281 53279 4027ad 53280 401e9b 28 API calls 53279->53280 53282 4027ab 53280->53282 53281->53279 53283 4027a2 53281->53283 53282->53163 53410 402ee5 28 API calls 53283->53410 53411 440e5e 53285->53411 53288 401f66 28 API calls 53289 41221e 53288->53289 53289->53138 53291 40b055 53290->53291 53293 40b060 53291->53293 53294 40b138 28 API calls 53291->53294 53293->53257 53294->53293 53307 410bf1 53295->53307 53299 403b48 53298->53299 53358 403b7a 53299->53358 53303 10001c6b ___scrt_fastfail 53302->53303 53367 100012ee 53303->53367 53305 10001c87 53305->53260 53306 410e65 28 API calls ___std_exception_copy 53306->53259 53338 410691 53307->53338 53309 410c10 53310 410bed 53309->53310 53312 410691 SetLastError 53309->53312 53325 410cf7 SetLastError 53309->53325 53310->53306 53314 410c37 53312->53314 53313 410c97 GetNativeSystemInfo 53315 410cae 53313->53315 53314->53310 53314->53313 53314->53314 53314->53325 53315->53325 53341 410b96 VirtualAlloc 53315->53341 53317 410cd6 53318 410cfe GetProcessHeap HeapAlloc 53317->53318 53351 410b96 VirtualAlloc 53317->53351 53320 410d15 53318->53320 53321 410d27 53318->53321 53352 410bad VirtualFree 53320->53352 53323 410691 SetLastError 53321->53323 53326 410d70 53323->53326 53324 410cee 53324->53318 53324->53325 53325->53310 53327 410e1d 53326->53327 53342 410b96 VirtualAlloc 53326->53342 53353 410f88 GetProcessHeap HeapFree 53327->53353 53330 410d89 ctype 53343 4106a4 SetLastError ctype ___scrt_fastfail 53330->53343 53332 410db5 53332->53327 53344 410a4d SetLastError SetLastError 53332->53344 53334 410ddc 53334->53327 53345 410841 53334->53345 53336 410de7 53336->53310 53336->53327 53337 410e12 SetLastError 53336->53337 53337->53327 53339 4106a0 53338->53339 53340 410695 SetLastError 53338->53340 53339->53309 53340->53309 53341->53317 53342->53330 53343->53332 53344->53334 53349 410868 53345->53349 53346 410957 53347 4107ab VirtualProtect 53346->53347 53348 410969 53347->53348 53348->53336 53349->53346 53349->53348 53354 4107ab 53349->53354 53351->53324 53352->53325 53353->53310 53355 4107b5 53354->53355 53357 4107c0 53354->53357 53356 4107fa VirtualProtect 53355->53356 53355->53357 53356->53357 53357->53349 53359 403b86 53358->53359 53362 403b9e 53359->53362 53361 403b5a 53361->53266 53363 403ba8 53362->53363 53365 403bb3 53363->53365 53366 403cfd 28 API calls 53363->53366 53365->53361 53366->53365 53368 10001324 ___scrt_fastfail 53367->53368 53369 100013b7 GetEnvironmentVariableW 53368->53369 53393 100010f1 53369->53393 53372 100010f1 57 API calls 53373 10001465 53372->53373 53374 100010f1 57 API calls 53373->53374 53375 10001479 53374->53375 53376 100010f1 57 API calls 53375->53376 53377 1000148d 53376->53377 53378 100010f1 57 API calls 53377->53378 53379 100014a1 53378->53379 53380 100010f1 57 API calls 53379->53380 53381 100014b5 lstrlenW 53380->53381 53382 100014d2 53381->53382 53383 100014d9 lstrlenW 53381->53383 53382->53305 53384 100010f1 57 API calls 53383->53384 53385 10001501 lstrlenW lstrcatW 53384->53385 53386 100010f1 57 API calls 53385->53386 53387 10001539 lstrlenW lstrcatW 53386->53387 53388 100010f1 57 API calls 53387->53388 53389 1000156b lstrlenW lstrcatW 53388->53389 53390 100010f1 57 API calls 53389->53390 53391 1000159d lstrlenW lstrcatW 53390->53391 53392 100010f1 57 API calls 53391->53392 53392->53382 53394 10001118 ___scrt_fastfail 53393->53394 53395 10001129 lstrlenW 53394->53395 53406 10002c40 53395->53406 53398 10001177 lstrlenW FindFirstFileW 53400 100011a0 53398->53400 53401 100011e1 53398->53401 53399 10001168 lstrlenW 53399->53398 53402 100011c7 FindNextFileW 53400->53402 53403 100011aa 53400->53403 53401->53372 53402->53400 53405 100011da FindClose 53402->53405 53403->53402 53408 10001000 57 API calls ___scrt_fastfail 53403->53408 53405->53401 53407 10001148 lstrcatW lstrlenW 53406->53407 53407->53398 53407->53399 53408->53403 53409->53271 53410->53282 53412 440e6a 53411->53412 53415 440c5a 53412->53415 53416 440c71 53415->53416 53420 41af72 53416->53420 53421 445564 20 API calls __dosmaperr 53416->53421 53418 440ca8 53422 43aa37 26 API calls _Deallocate 53418->53422 53420->53288 53421->53418 53422->53420 53423->53235 53425 401fbd 28 API calls 53424->53425 53426 414d4f SetEvent 53425->53426 53427 414d64 53426->53427 53428 403b60 28 API calls 53427->53428 53429 414d7e 53428->53429 53430 401fbd 28 API calls 53429->53430 53431 414d8e 53430->53431 53432 401fbd 28 API calls 53431->53432 53433 414da0 53432->53433 53434 41b1ce 28 API calls 53433->53434 53435 414da9 53434->53435 53436 414f1c 53435->53436 53437 414dc9 GetTickCount 53435->53437 53498 414f2b 53435->53498 53438 401d8c 26 API calls 53436->53438 53439 41af51 28 API calls 53437->53439 53440 4163d6 53438->53440 53442 414ddf 53439->53442 53444 401eea 26 API calls 53440->53444 53441 414f3f 53529 404ab1 83 API calls 53441->53529 53503 41aeab GetLastInputInfo GetTickCount 53442->53503 53447 4163e2 53444->53447 53446 414f0f 53446->53436 53449 401eea 26 API calls 53447->53449 53448 414de6 53450 41af51 28 API calls 53448->53450 53451 4163ee 53449->53451 53452 414df1 53450->53452 53504 41ae5d 53452->53504 53455 41b0d3 28 API calls 53456 414e0d 53455->53456 53457 401d64 28 API calls 53456->53457 53458 414e1b 53457->53458 53459 4027ec 28 API calls 53458->53459 53460 414e29 53459->53460 53461 40275c 28 API calls 53460->53461 53462 414e38 53461->53462 53463 4027cb 28 API calls 53462->53463 53464 414e47 53463->53464 53465 40275c 28 API calls 53464->53465 53466 414e56 53465->53466 53467 4027cb 28 API calls 53466->53467 53468 414e62 53467->53468 53469 40275c 28 API calls 53468->53469 53470 414e6c 53469->53470 53471 404468 60 API calls 53470->53471 53472 414e7b 53471->53472 53473 401eea 26 API calls 53472->53473 53474 414e84 53473->53474 53475 401eea 26 API calls 53474->53475 53476 414e90 53475->53476 53477 401eea 26 API calls 53476->53477 53478 414e9c 53477->53478 53479 401eea 26 API calls 53478->53479 53480 414ea8 53479->53480 53481 401eea 26 API calls 53480->53481 53482 414eb4 53481->53482 53483 401eea 26 API calls 53482->53483 53484 414ec0 53483->53484 53485 401e13 26 API calls 53484->53485 53486 414ecc 53485->53486 53487 401eea 26 API calls 53486->53487 53488 414ed5 53487->53488 53489 401eea 26 API calls 53488->53489 53490 414ede 53489->53490 53491 401d64 28 API calls 53490->53491 53492 414ee9 53491->53492 53509 43a7f7 53492->53509 53495 414f21 53497 401d64 28 API calls 53495->53497 53496 414efb 53499 414f14 53496->53499 53500 414f09 53496->53500 53497->53498 53498->53436 53498->53441 53514 404915 53499->53514 53513 4049ba 81 API calls 53500->53513 53503->53448 53530 436260 53504->53530 53507 403b40 28 API calls 53508 414dff 53507->53508 53508->53455 53510 43a810 _strftime 53509->53510 53532 439b4e 53510->53532 53513->53446 53515 4049b1 53514->53515 53516 40492a 53514->53516 53515->53436 53517 404933 53516->53517 53518 404987 CreateEventA CreateThread 53516->53518 53519 404942 GetLocalTime 53516->53519 53517->53518 53518->53515 53567 404b1d 53518->53567 53520 41af51 28 API calls 53519->53520 53521 40495b 53520->53521 53566 404c9e 28 API calls 53521->53566 53523 404968 53524 401f66 28 API calls 53523->53524 53525 404977 53524->53525 53526 41a891 79 API calls 53525->53526 53527 40497c 53526->53527 53528 401eea 26 API calls 53527->53528 53528->53518 53529->53446 53531 41ae7c GetForegroundWindow GetWindowTextW 53530->53531 53531->53507 53550 43a755 53532->53550 53534 439b9b 53559 4394ee 38 API calls 2 library calls 53534->53559 53536 439b60 53536->53534 53537 439b75 53536->53537 53549 414ef6 53536->53549 53557 445564 20 API calls __dosmaperr 53537->53557 53539 439b7a 53558 43aa37 26 API calls _Deallocate 53539->53558 53542 439ba7 53543 439bd6 53542->53543 53560 43a79a 42 API calls __Toupper 53542->53560 53546 439c42 53543->53546 53561 43a701 26 API calls 2 library calls 53543->53561 53562 43a701 26 API calls 2 library calls 53546->53562 53547 439d09 _strftime 53547->53549 53563 445564 20 API calls __dosmaperr 53547->53563 53549->53495 53549->53496 53551 43a75a 53550->53551 53552 43a76d 53550->53552 53564 445564 20 API calls __dosmaperr 53551->53564 53552->53536 53554 43a75f 53565 43aa37 26 API calls _Deallocate 53554->53565 53556 43a76a 53556->53536 53557->53539 53558->53549 53559->53542 53560->53542 53561->53546 53562->53547 53563->53549 53564->53554 53565->53556 53566->53523 53570 404b29 101 API calls 53567->53570 53569 404b26 53570->53569 53571->52985 53572->52990 53573->52992 53574 1000c7a7 53575 1000c7be 53574->53575 53579 1000c82c 53574->53579 53575->53579 53586 1000c7e6 GetModuleHandleA 53575->53586 53576 1000c872 53577 1000c835 GetModuleHandleA 53580 1000c83f 53577->53580 53579->53576 53579->53577 53579->53580 53580->53579 53581 1000c85f GetProcAddress 53580->53581 53581->53579 53582 1000c7dd 53582->53579 53582->53580 53583 1000c800 GetProcAddress 53582->53583 53583->53579 53584 1000c80d VirtualProtect 53583->53584 53584->53579 53585 1000c81c VirtualProtect 53584->53585 53585->53579 53587 1000c7ef 53586->53587 53594 1000c82c 53586->53594 53598 1000c803 GetProcAddress 53587->53598 53589 1000c7f4 53592 1000c800 GetProcAddress 53589->53592 53589->53594 53590 1000c872 53591 1000c835 GetModuleHandleA 53596 1000c83f 53591->53596 53593 1000c80d VirtualProtect 53592->53593 53592->53594 53593->53594 53595 1000c81c VirtualProtect 53593->53595 53594->53590 53594->53591 53594->53596 53595->53594 53596->53594 53597 1000c85f GetProcAddress 53596->53597 53597->53594 53599 1000c82c 53598->53599 53600 1000c80d VirtualProtect 53598->53600 53602 1000c872 53599->53602 53603 1000c835 GetModuleHandleA 53599->53603 53600->53599 53601 1000c81c VirtualProtect 53600->53601 53601->53599 53605 1000c83f 53603->53605 53604 1000c85f GetProcAddress 53604->53605 53605->53599 53605->53604 53606 433bc9 53607 433bd5 ___BuildCatchObject 53606->53607 53638 4338be 53607->53638 53609 433bdc 53610 433d2f 53609->53610 53613 433c06 53609->53613 53940 433d4f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 53610->53940 53612 433d36 53941 4428ce 28 API calls _Atexit 53612->53941 53625 433c45 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 53613->53625 53934 4436e1 5 API calls CatchGuardHandler 53613->53934 53615 433d3c 53942 442880 28 API calls _Atexit 53615->53942 53618 433c1f 53620 433c25 53618->53620 53935 443685 5 API calls CatchGuardHandler 53618->53935 53619 433d44 53622 433ca6 53649 433e69 53622->53649 53625->53622 53936 43f037 38 API calls 4 library calls 53625->53936 53632 433cc8 53632->53612 53633 433ccc 53632->53633 53634 433cd5 53633->53634 53938 442871 28 API calls _Atexit 53633->53938 53939 433a4d 13 API calls 2 library calls 53634->53939 53637 433cdd 53637->53620 53639 4338c7 53638->53639 53943 434015 IsProcessorFeaturePresent 53639->53943 53641 4338d3 53944 437bfe 10 API calls 3 library calls 53641->53944 53643 4338d8 53644 4338dc 53643->53644 53945 44356e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53643->53945 53644->53609 53646 4338e5 53647 4338f3 53646->53647 53946 437c27 8 API calls 3 library calls 53646->53946 53647->53609 53650 436260 ___scrt_fastfail 53649->53650 53651 433e7c GetStartupInfoW 53650->53651 53652 433cac 53651->53652 53653 443632 53652->53653 53947 44dfd9 53653->53947 53655 44363b 53656 433cb5 53655->53656 53951 44e2e3 38 API calls 53655->53951 53658 40d83a 53656->53658 53953 41beee LoadLibraryA GetProcAddress 53658->53953 53660 40d856 GetModuleFileNameW 53958 40e240 53660->53958 53662 40d872 53663 401fbd 28 API calls 53662->53663 53664 40d881 53663->53664 53665 401fbd 28 API calls 53664->53665 53666 40d890 53665->53666 53667 41b1ce 28 API calls 53666->53667 53668 40d899 53667->53668 53973 40e995 53668->53973 53670 40d8a2 53671 401d8c 26 API calls 53670->53671 53672 40d8ab 53671->53672 53673 40d908 53672->53673 53674 40d8be 53672->53674 53675 401d64 28 API calls 53673->53675 54182 40ea5e 111 API calls 53674->54182 53677 40d918 53675->53677 53680 401d64 28 API calls 53677->53680 53678 40d8d0 53679 401d64 28 API calls 53678->53679 53683 40d8dc 53679->53683 53681 40d937 53680->53681 53682 404cbf 28 API calls 53681->53682 53684 40d946 53682->53684 54183 40ea0f 68 API calls 53683->54183 53685 405ce6 28 API calls 53684->53685 53687 40d952 53685->53687 53690 401eef 26 API calls 53687->53690 53688 40d8f7 54184 40e22d 68 API calls 53688->54184 53691 40d95e 53690->53691 53692 401eea 26 API calls 53691->53692 53693 40d967 53692->53693 53695 401eea 26 API calls 53693->53695 53694 401eea 26 API calls 53696 40dd72 53694->53696 53697 40d970 53695->53697 53937 433e9f GetModuleHandleW 53696->53937 53698 401d64 28 API calls 53697->53698 53699 40d979 53698->53699 53700 401ebd 28 API calls 53699->53700 53701 40d984 53700->53701 53702 401d64 28 API calls 53701->53702 53703 40d99d 53702->53703 53704 401d64 28 API calls 53703->53704 53705 40d9b8 53704->53705 53706 40da19 53705->53706 54185 4085b4 53705->54185 53708 401d64 28 API calls 53706->53708 53723 40e20c 53706->53723 53712 40da30 53708->53712 53709 40d9e5 53710 401eef 26 API calls 53709->53710 53711 40d9f1 53710->53711 53714 401eea 26 API calls 53711->53714 53713 40da77 53712->53713 53718 41258f 3 API calls 53712->53718 53977 40bed7 53713->53977 53715 40d9fa 53714->53715 54189 41258f RegOpenKeyExA 53715->54189 53717 40da7d 53719 40d900 53717->53719 53980 41a66e 53717->53980 53724 40da5b 53718->53724 53719->53694 53722 40da98 53725 40daeb 53722->53725 53997 40697b 53722->53997 54277 4129da 30 API calls 53723->54277 53724->53713 54192 4129da 30 API calls 53724->54192 53727 401d64 28 API calls 53725->53727 53730 40daf4 53727->53730 53739 40db00 53730->53739 53740 40db05 53730->53740 53732 40e222 54278 41138d 64 API calls ___scrt_fastfail 53732->54278 53734 40dac1 53737 401d64 28 API calls 53734->53737 53735 40dab7 54193 40699d 30 API calls 53735->54193 53747 40daca 53737->53747 54196 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 53739->54196 53742 401d64 28 API calls 53740->53742 53741 40dabc 54194 4064d0 97 API calls 53741->54194 53745 40db0e 53742->53745 54001 41b013 53745->54001 53747->53725 53750 40dae6 53747->53750 53748 40db19 54005 401e18 53748->54005 54195 4064d0 97 API calls 53750->54195 53751 40db24 53753 401e13 26 API calls 53751->53753 53754 40db2d 53753->53754 53755 401d64 28 API calls 53754->53755 53756 40db36 53755->53756 53757 401d64 28 API calls 53756->53757 53758 40db50 53757->53758 53759 401d64 28 API calls 53758->53759 53760 40db6a 53759->53760 53761 401d64 28 API calls 53760->53761 53763 40db83 53761->53763 53762 40dbf0 53764 40dbff 53762->53764 53771 40dd7d ___scrt_fastfail 53762->53771 53763->53762 53765 401d64 28 API calls 53763->53765 53766 40dc08 53764->53766 53794 40dc84 ___scrt_fastfail 53764->53794 53769 40db98 _wcslen 53765->53769 53767 401d64 28 API calls 53766->53767 53768 40dc11 53767->53768 53770 401d64 28 API calls 53768->53770 53769->53762 53772 401d64 28 API calls 53769->53772 53773 40dc23 53770->53773 54256 412735 RegOpenKeyExA 53771->54256 53774 40dbb3 53772->53774 53776 401d64 28 API calls 53773->53776 53777 401d64 28 API calls 53774->53777 53778 40dc35 53776->53778 53779 40dbc8 53777->53779 53782 401d64 28 API calls 53778->53782 54197 40c89e 53779->54197 53780 40ddc2 53781 401d64 28 API calls 53780->53781 53783 40dde9 53781->53783 53785 40dc5e 53782->53785 53789 401f66 28 API calls 53783->53789 53788 401d64 28 API calls 53785->53788 53787 401e18 26 API calls 53790 40dbe7 53787->53790 53791 40dc6f 53788->53791 53792 40ddf8 53789->53792 53793 401e13 26 API calls 53790->53793 54254 40bc67 46 API calls _wcslen 53791->54254 54019 4127aa RegCreateKeyA 53792->54019 53793->53762 54009 41297a 53794->54009 53798 40dd18 53803 401d64 28 API calls 53798->53803 53799 40dc7f 53799->53794 53801 401d64 28 API calls 53802 40de1a 53801->53802 53805 43a7f7 _strftime 42 API calls 53802->53805 53804 40dd2f 53803->53804 53804->53780 53808 40dd43 53804->53808 53806 40de27 53805->53806 53807 40de31 53806->53807 53809 40de54 53806->53809 54259 41c0bb 87 API calls ___scrt_fastfail 53807->54259 53810 401d64 28 API calls 53808->53810 53814 401f66 28 API calls 53809->53814 53812 40dd51 53810->53812 53815 41b013 28 API calls 53812->53815 53813 40de38 CreateThread 53813->53809 54689 41cb7a 10 API calls 53813->54689 53816 40de69 53814->53816 53817 40dd5a 53815->53817 53818 401f66 28 API calls 53816->53818 54255 40e2f1 119 API calls 53817->54255 53820 40de78 53818->53820 53822 41a891 79 API calls 53820->53822 53821 40dd5f 53821->53780 53823 40dd66 53821->53823 53824 40de7d 53822->53824 53823->53719 53825 401d64 28 API calls 53824->53825 53826 40de89 53825->53826 53827 401d64 28 API calls 53826->53827 53828 40de9e 53827->53828 53829 401d64 28 API calls 53828->53829 53830 40debe 53829->53830 53831 43a7f7 _strftime 42 API calls 53830->53831 53832 40decb 53831->53832 53833 401d64 28 API calls 53832->53833 53834 40ded6 53833->53834 53835 401d64 28 API calls 53834->53835 53836 40dee7 53835->53836 53837 401d64 28 API calls 53836->53837 53838 40defc 53837->53838 53839 401d64 28 API calls 53838->53839 53840 40df0d 53839->53840 53841 40df14 StrToIntA 53840->53841 54025 409517 53841->54025 53844 401d64 28 API calls 53845 40df2f 53844->53845 53846 40df74 53845->53846 53847 40df3b 53845->53847 53850 401d64 28 API calls 53846->53850 54260 433818 22 API calls 3 library calls 53847->54260 53849 40df44 53851 401d64 28 API calls 53849->53851 53852 40df84 53850->53852 53853 40df57 53851->53853 53854 40df90 53852->53854 53855 40dfcc 53852->53855 53856 40df5e CreateThread 53853->53856 54261 433818 22 API calls 3 library calls 53854->54261 53858 401d64 28 API calls 53855->53858 53856->53846 54687 41931e 112 API calls 2 library calls 53856->54687 53860 40dfd5 53858->53860 53859 40df99 53861 401d64 28 API calls 53859->53861 53863 40dfe1 53860->53863 53864 40e03f 53860->53864 53862 40dfab 53861->53862 53865 40dfb2 CreateThread 53862->53865 53867 401d64 28 API calls 53863->53867 53866 401d64 28 API calls 53864->53866 53865->53855 54692 41931e 112 API calls 2 library calls 53865->54692 53868 40e048 53866->53868 53869 40dff1 53867->53869 53870 40e054 53868->53870 53871 40e08d 53868->53871 53872 401d64 28 API calls 53869->53872 53873 401d64 28 API calls 53870->53873 54050 41a9ad GetComputerNameExW GetUserNameW 53871->54050 53874 40e006 53872->53874 53876 40e05d 53873->53876 54262 40c854 53874->54262 53882 401d64 28 API calls 53876->53882 53878 401e18 26 API calls 53879 40e0a1 53878->53879 53881 401e13 26 API calls 53879->53881 53884 40e0aa 53881->53884 53888 40e072 53882->53888 53886 40e0b3 SetProcessDEPPolicy 53884->53886 53887 40e0b6 CreateThread 53884->53887 53885 401e18 26 API calls 53889 40e025 53885->53889 53886->53887 53890 40e0d7 53887->53890 53891 40e0cb CreateThread 53887->53891 54660 40e627 53887->54660 53895 43a7f7 _strftime 42 API calls 53888->53895 53892 401e13 26 API calls 53889->53892 53893 40e0e0 CreateThread 53890->53893 53894 40e0ec 53890->53894 53891->53890 54688 41100e 145 API calls 53891->54688 53896 40e02e CreateThread 53892->53896 53893->53894 54690 4115fc 38 API calls ___scrt_fastfail 53893->54690 53898 40e146 53894->53898 53900 401f66 28 API calls 53894->53900 53897 40e07f 53895->53897 53896->53864 54691 40196b 49 API calls _strftime 53896->54691 54273 40b95c 7 API calls 53897->54273 54061 412546 RegOpenKeyExA 53898->54061 53901 40e119 53900->53901 54274 404c9e 28 API calls 53901->54274 53904 40e126 53906 401f66 28 API calls 53904->53906 53908 40e135 53906->53908 53907 40e1fd 54073 40cbac 53907->54073 53911 41a891 79 API calls 53908->53911 53910 41b013 28 API calls 53913 40e177 53910->53913 53914 40e13a 53911->53914 54064 41265c RegOpenKeyExW 53913->54064 53916 401eea 26 API calls 53914->53916 53916->53898 53921 401e13 26 API calls 53924 40e198 53921->53924 53922 40e1c0 DeleteFileW 53923 40e1c7 53922->53923 53922->53924 53926 41b013 28 API calls 53923->53926 53924->53922 53924->53923 53925 40e1ae Sleep 53924->53925 54275 401e07 53925->54275 53928 40e1d7 53926->53928 54069 412a52 RegOpenKeyExW 53928->54069 53930 40e1ea 53931 401e13 26 API calls 53930->53931 53932 40e1f4 53931->53932 53933 401e13 26 API calls 53932->53933 53933->53907 53934->53618 53935->53625 53936->53622 53937->53632 53938->53634 53939->53637 53940->53612 53941->53615 53942->53619 53943->53641 53944->53643 53945->53646 53946->53644 53948 44dfe2 53947->53948 53950 44dfeb 53947->53950 53952 44ded8 51 API calls 4 library calls 53948->53952 53950->53655 53951->53655 53952->53950 53954 41bf2d LoadLibraryA GetProcAddress 53953->53954 53955 41bf1d GetModuleHandleA GetProcAddress 53953->53955 53956 41bf56 32 API calls 53954->53956 53957 41bf46 LoadLibraryA GetProcAddress 53954->53957 53955->53954 53956->53660 53957->53956 54279 41a84a FindResourceA 53958->54279 53961 43aa9c ___std_exception_copy 21 API calls 53962 40e26a ctype 53961->53962 53963 401f86 28 API calls 53962->53963 53964 40e285 53963->53964 53965 401eef 26 API calls 53964->53965 53966 40e290 53965->53966 53967 401eea 26 API calls 53966->53967 53968 40e299 53967->53968 53969 43aa9c ___std_exception_copy 21 API calls 53968->53969 53970 40e2aa ctype 53969->53970 54282 406052 53970->54282 53972 40e2dd 53972->53662 53974 40e9a2 53973->53974 53976 40e9b2 53974->53976 54285 40200a 26 API calls 53974->54285 53976->53670 54286 401e8f 53977->54286 53979 40bee1 CreateMutexA GetLastError 53979->53717 54288 41b366 53980->54288 53982 41a67c 54292 4125eb RegOpenKeyExA 53982->54292 53985 401eef 26 API calls 53986 41a6aa 53985->53986 53987 401eea 26 API calls 53986->53987 53988 41a6b2 53987->53988 53989 41a705 53988->53989 53990 4125eb 31 API calls 53988->53990 53989->53722 53991 41a6d8 53990->53991 53992 41a6e3 StrToIntA 53991->53992 53993 41a6f1 53992->53993 53994 41a6fa 53992->53994 54297 41c30d 28 API calls 53993->54297 53996 401eea 26 API calls 53994->53996 53996->53989 53998 40698f 53997->53998 53999 41258f 3 API calls 53998->53999 54000 406996 53999->54000 54000->53734 54000->53735 54002 41b027 54001->54002 54003 40b027 28 API calls 54002->54003 54004 41b02f 54003->54004 54004->53748 54006 401e27 54005->54006 54008 401e33 54006->54008 54298 402121 26 API calls 54006->54298 54008->53751 54010 412998 54009->54010 54011 406052 28 API calls 54010->54011 54012 4129ad 54011->54012 54013 401fbd 28 API calls 54012->54013 54014 4129bd 54013->54014 54015 4127aa 29 API calls 54014->54015 54016 4129c7 54015->54016 54017 401eea 26 API calls 54016->54017 54018 4129d4 54017->54018 54018->53798 54020 4127fa 54019->54020 54022 4127c3 54019->54022 54021 401eea 26 API calls 54020->54021 54023 40de0e 54021->54023 54024 4127d5 RegSetValueExA RegCloseKey 54022->54024 54023->53801 54024->54020 54026 409536 _wcslen 54025->54026 54027 409541 54026->54027 54028 409558 54026->54028 54029 40c89e 32 API calls 54027->54029 54030 40c89e 32 API calls 54028->54030 54031 409549 54029->54031 54032 409560 54030->54032 54033 401e18 26 API calls 54031->54033 54034 401e18 26 API calls 54032->54034 54049 409553 54033->54049 54035 40956e 54034->54035 54036 401e13 26 API calls 54035->54036 54037 409576 54036->54037 54314 40856b 28 API calls 54037->54314 54038 401e13 26 API calls 54040 4095ad 54038->54040 54299 409837 54040->54299 54041 409588 54315 4028cf 54041->54315 54045 409593 54046 401e18 26 API calls 54045->54046 54047 40959d 54046->54047 54048 401e13 26 API calls 54047->54048 54048->54049 54049->54038 54051 403b40 28 API calls 54050->54051 54052 41a9fc 54051->54052 54485 403cbb 54052->54485 54054 41aa08 54055 4028cf 28 API calls 54054->54055 54056 41aa12 54055->54056 54057 401e13 26 API calls 54056->54057 54058 41aa1b 54057->54058 54059 401e13 26 API calls 54058->54059 54060 40e096 54059->54060 54060->53878 54062 412567 RegQueryValueExA RegCloseKey 54061->54062 54063 40e15e 54061->54063 54062->54063 54063->53907 54063->53910 54065 412688 RegQueryValueExW RegCloseKey 54064->54065 54066 4126b5 54064->54066 54065->54066 54067 403b40 28 API calls 54066->54067 54068 40e18d 54067->54068 54068->53921 54070 412a6a RegDeleteValueW 54069->54070 54071 412a7e 54069->54071 54070->54071 54072 412a7a 54070->54072 54071->53930 54072->53930 54074 40cbc5 54073->54074 54075 412546 3 API calls 54074->54075 54076 40cbcc 54075->54076 54077 40cbeb 54076->54077 54499 401602 54076->54499 54081 40cc37 54077->54081 54079 40cbd9 54502 4128ad RegCreateKeyA 54079->54502 54082 40cc4b 54081->54082 54083 412546 3 API calls 54082->54083 54084 40cc52 54083->54084 54085 40cc81 54084->54085 54086 40cc57 54084->54086 54089 41258f 3 API calls 54085->54089 54087 401602 27 API calls 54086->54087 54088 40cc5e 54087->54088 54519 43eadd 54088->54519 54091 40cc7f 54089->54091 54096 4140ac 54091->54096 54094 40cc6a 54095 4128ad 3 API calls 54094->54095 54095->54091 54097 4140c3 54096->54097 54563 41ac7e 54097->54563 54099 4140ce 54100 401d64 28 API calls 54099->54100 54101 4140e7 54100->54101 54102 43a7f7 _strftime 42 API calls 54101->54102 54103 4140f4 54102->54103 54104 414106 54103->54104 54105 4140f9 Sleep 54103->54105 54106 401f66 28 API calls 54104->54106 54105->54104 54107 414115 54106->54107 54108 401d64 28 API calls 54107->54108 54109 414123 54108->54109 54110 401fbd 28 API calls 54109->54110 54111 41412b 54110->54111 54112 41b1ce 28 API calls 54111->54112 54113 414133 54112->54113 54567 404262 WSAStartup 54113->54567 54115 41413d 54116 401d64 28 API calls 54115->54116 54117 414146 54116->54117 54118 401d64 28 API calls 54117->54118 54122 4141c5 54117->54122 54119 41415f 54118->54119 54121 401d64 28 API calls 54119->54121 54120 401fbd 28 API calls 54120->54122 54123 414170 54121->54123 54122->54120 54124 41b1ce 28 API calls 54122->54124 54127 401d64 28 API calls 54122->54127 54128 4085b4 28 API calls 54122->54128 54132 401eef 26 API calls 54122->54132 54138 41431c WSAGetLastError 54122->54138 54139 4041f1 3 API calls 54122->54139 54142 404915 104 API calls 54122->54142 54143 40428c 96 API calls 54122->54143 54144 41a891 79 API calls 54122->54144 54145 4047eb 98 API calls 54122->54145 54146 404cbf 28 API calls 54122->54146 54148 401d8c 26 API calls 54122->54148 54149 414cfa 54122->54149 54152 401f66 28 API calls 54122->54152 54153 401eea 26 API calls 54122->54153 54156 4082dc 28 API calls 54122->54156 54157 440e5e 26 API calls 54122->54157 54158 412735 3 API calls 54122->54158 54159 4125eb 31 API calls 54122->54159 54160 403b40 28 API calls 54122->54160 54161 41aff9 28 API calls 54122->54161 54164 401d64 28 API calls 54122->54164 54168 41af51 28 API calls 54122->54168 54169 41ae5d 30 API calls 54122->54169 54170 41b0d3 28 API calls 54122->54170 54172 4027ec 28 API calls 54122->54172 54173 405ce6 28 API calls 54122->54173 54174 4027cb 28 API calls 54122->54174 54175 40275c 28 API calls 54122->54175 54176 404468 60 API calls 54122->54176 54177 4045d5 260 API calls 54122->54177 54178 414c76 54122->54178 54180 414cb4 CreateThread 54122->54180 54181 401e13 26 API calls 54122->54181 54568 414072 54122->54568 54573 41ab78 54122->54573 54576 41375b 54122->54576 54579 40cc9a 54122->54579 54585 40cbf1 54122->54585 54591 41aeab GetLastInputInfo GetTickCount 54122->54591 54592 40e751 GetLocaleInfoA 54122->54592 54597 404c9e 28 API calls 54122->54597 54125 401d64 28 API calls 54123->54125 54124->54122 54126 414181 54125->54126 54129 401d64 28 API calls 54126->54129 54127->54122 54128->54122 54130 414192 54129->54130 54131 401d64 28 API calls 54130->54131 54133 4141a3 54131->54133 54132->54122 54134 401d64 28 API calls 54133->54134 54135 4141b5 54134->54135 54595 404101 87 API calls 54135->54595 54596 41be81 30 API calls 54138->54596 54139->54122 54142->54122 54143->54122 54144->54122 54145->54122 54146->54122 54147 401d64 28 API calls 54147->54149 54148->54122 54149->54147 54150 43a7f7 _strftime 42 API calls 54149->54150 54151 414d12 Sleep 54150->54151 54151->54122 54152->54122 54153->54122 54156->54122 54157->54122 54158->54122 54159->54122 54160->54122 54161->54122 54165 4145fa GetTickCount 54164->54165 54166 41af51 28 API calls 54165->54166 54166->54122 54168->54122 54169->54122 54170->54122 54172->54122 54173->54122 54174->54122 54175->54122 54176->54122 54177->54122 54598 40a767 84 API calls 54178->54598 54180->54122 54642 41a07f 103 API calls 54180->54642 54181->54122 54182->53678 54183->53688 54186 4085c0 54185->54186 54187 402e78 28 API calls 54186->54187 54188 4085e4 54187->54188 54188->53709 54190 4125e3 54189->54190 54191 4125b9 RegQueryValueExA RegCloseKey 54189->54191 54190->53706 54191->54190 54192->53713 54193->53741 54194->53734 54195->53725 54196->53740 54198 40c8ba 54197->54198 54199 40c8da 54198->54199 54200 40c90f 54198->54200 54212 40c8d0 54198->54212 54654 41a956 29 API calls 54199->54654 54202 41b366 2 API calls 54200->54202 54201 40ca03 GetLongPathNameW 54205 403b40 28 API calls 54201->54205 54206 40c914 54202->54206 54204 40c8e3 54207 401e18 26 API calls 54204->54207 54208 40ca18 54205->54208 54209 40c918 54206->54209 54210 40c96a 54206->54210 54211 40c8ed 54207->54211 54213 403b40 28 API calls 54208->54213 54215 403b40 28 API calls 54209->54215 54214 403b40 28 API calls 54210->54214 54219 401e13 26 API calls 54211->54219 54212->54201 54216 40ca27 54213->54216 54217 40c978 54214->54217 54218 40c926 54215->54218 54643 40cd0a 54216->54643 54224 403b40 28 API calls 54217->54224 54222 403b40 28 API calls 54218->54222 54219->54212 54226 40c93c 54222->54226 54225 40c98e 54224->54225 54228 402860 28 API calls 54225->54228 54229 402860 28 API calls 54226->54229 54227 40ca45 54230 402860 28 API calls 54227->54230 54232 40c999 54228->54232 54233 40c947 54229->54233 54231 40ca4f 54230->54231 54234 401e13 26 API calls 54231->54234 54235 401e18 26 API calls 54232->54235 54236 401e18 26 API calls 54233->54236 54237 40ca59 54234->54237 54238 40c9a4 54235->54238 54239 40c952 54236->54239 54240 401e13 26 API calls 54237->54240 54241 401e13 26 API calls 54238->54241 54242 401e13 26 API calls 54239->54242 54243 40ca62 54240->54243 54244 40c9ad 54241->54244 54245 40c95b 54242->54245 54246 401e13 26 API calls 54243->54246 54247 401e13 26 API calls 54244->54247 54248 401e13 26 API calls 54245->54248 54249 40ca6b 54246->54249 54247->54211 54248->54211 54250 401e13 26 API calls 54249->54250 54251 40ca74 54250->54251 54252 401e13 26 API calls 54251->54252 54253 40ca7d 54252->54253 54253->53787 54254->53799 54255->53821 54257 41275b RegQueryValueExA RegCloseKey 54256->54257 54258 41277f 54256->54258 54257->54258 54258->53780 54259->53813 54260->53849 54261->53859 54263 401f66 28 API calls 54262->54263 54264 40c86b 54263->54264 54265 41b013 28 API calls 54264->54265 54266 40c876 54265->54266 54267 40c89e 32 API calls 54266->54267 54268 40c887 54267->54268 54269 401e13 26 API calls 54268->54269 54270 40c890 54269->54270 54271 401eea 26 API calls 54270->54271 54272 40c898 54271->54272 54272->53885 54273->53871 54274->53904 54276 401e0c 54275->54276 54277->53732 54280 41a867 LoadResource LockResource SizeofResource 54279->54280 54281 40e25b 54279->54281 54280->54281 54281->53961 54283 401f86 28 API calls 54282->54283 54284 406066 54283->54284 54284->53972 54285->53976 54287 401e94 54286->54287 54289 41b373 GetCurrentProcess IsWow64Process 54288->54289 54290 41b38e 54288->54290 54289->54290 54291 41b38a 54289->54291 54290->53982 54291->53982 54293 412619 RegQueryValueExA RegCloseKey 54292->54293 54294 412641 54292->54294 54293->54294 54295 401f66 28 API calls 54294->54295 54296 412656 54295->54296 54296->53985 54297->53994 54298->54008 54300 409855 54299->54300 54301 41258f 3 API calls 54300->54301 54302 40985c 54301->54302 54303 409870 54302->54303 54304 40988a 54302->54304 54306 4095cf 54303->54306 54307 409875 54303->54307 54318 4082dc 54304->54318 54306->53844 54309 4082dc 28 API calls 54307->54309 54310 409883 54309->54310 54344 409959 29 API calls 54310->54344 54313 409888 54313->54306 54314->54041 54476 402d8b 54315->54476 54317 4028dd 54317->54045 54319 4082eb 54318->54319 54345 408431 54319->54345 54321 408309 54322 4098a5 54321->54322 54350 40affa 54322->54350 54325 4098f6 54327 401f66 28 API calls 54325->54327 54326 4098ce 54328 401f66 28 API calls 54326->54328 54329 409901 54327->54329 54330 4098d8 54328->54330 54331 401f66 28 API calls 54329->54331 54332 41b013 28 API calls 54330->54332 54333 409910 54331->54333 54334 4098e6 54332->54334 54335 41a891 79 API calls 54333->54335 54354 40a876 31 API calls ___std_exception_copy 54334->54354 54337 409915 CreateThread 54335->54337 54339 409930 CreateThread 54337->54339 54340 40993c CreateThread 54337->54340 54361 4099a9 54337->54361 54338 4098ed 54341 401eea 26 API calls 54338->54341 54339->54340 54358 409993 54339->54358 54342 401e13 26 API calls 54340->54342 54355 4099b5 54340->54355 54341->54325 54343 409950 54342->54343 54343->54306 54344->54313 54475 40999f 135 API calls 54344->54475 54347 40843d 54345->54347 54346 40845b 54346->54321 54347->54346 54349 402f0d 28 API calls 54347->54349 54349->54346 54352 40b006 54350->54352 54351 4098c3 54351->54325 54351->54326 54352->54351 54353 403b9e 28 API calls 54352->54353 54353->54351 54354->54338 54364 40a3f4 54355->54364 54401 4099e4 54358->54401 54418 409e48 54361->54418 54369 40a402 54364->54369 54365 4099be 54366 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 54367 40b027 28 API calls 54366->54367 54367->54369 54369->54365 54369->54366 54372 40a4a2 GetWindowTextW 54369->54372 54374 40a5ff 54369->54374 54375 41aeab GetLastInputInfo GetTickCount 54369->54375 54376 40affa 28 API calls 54369->54376 54378 40a569 Sleep 54369->54378 54379 440e5e 26 API calls 54369->54379 54381 401f66 28 API calls 54369->54381 54382 40a4f1 54369->54382 54386 405ce6 28 API calls 54369->54386 54388 4028cf 28 API calls 54369->54388 54389 41b013 28 API calls 54369->54389 54390 401e13 26 API calls 54369->54390 54391 409d58 27 API calls 54369->54391 54392 401eea 26 API calls 54369->54392 54393 433724 5 API calls __Init_thread_wait 54369->54393 54394 433ab0 29 API calls __onexit 54369->54394 54395 4336da EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 54369->54395 54396 4082a8 28 API calls 54369->54396 54398 40b0dd 28 API calls 54369->54398 54399 40ae58 44 API calls 2 library calls 54369->54399 54400 404c9e 28 API calls 54369->54400 54372->54369 54377 401e13 26 API calls 54374->54377 54375->54369 54376->54369 54377->54365 54378->54369 54379->54369 54381->54369 54382->54369 54384 4082dc 28 API calls 54382->54384 54397 40a876 31 API calls ___std_exception_copy 54382->54397 54384->54382 54386->54369 54388->54369 54389->54369 54390->54369 54391->54369 54392->54369 54393->54369 54394->54369 54395->54369 54396->54369 54397->54382 54398->54369 54399->54369 54400->54369 54402 409a63 GetMessageA 54401->54402 54403 4099ff SetWindowsHookExA 54401->54403 54404 409a75 TranslateMessage DispatchMessageA 54402->54404 54416 40999c 54402->54416 54403->54402 54406 409a1b GetLastError 54403->54406 54404->54402 54404->54416 54407 41af51 28 API calls 54406->54407 54408 409a31 54407->54408 54417 404c9e 28 API calls 54408->54417 54410 409a3e 54411 401f66 28 API calls 54410->54411 54412 409a4d 54411->54412 54413 41a891 79 API calls 54412->54413 54414 409a52 54413->54414 54415 401eea 26 API calls 54414->54415 54415->54416 54417->54410 54419 409e5d Sleep 54418->54419 54438 409d97 54419->54438 54421 4099b2 54422 409e9d CreateDirectoryW 54427 409e6f 54422->54427 54423 409eae GetFileAttributesW 54423->54427 54424 401d64 28 API calls 54424->54427 54425 409ec5 SetFileAttributesW 54425->54427 54427->54419 54427->54421 54427->54422 54427->54423 54427->54424 54427->54425 54436 409f10 54427->54436 54451 41b79a 54427->54451 54428 409f3f PathFileExistsW 54428->54436 54430 401f86 28 API calls 54430->54436 54431 40a048 SetFileAttributesW 54431->54427 54432 401eef 26 API calls 54432->54436 54433 406052 28 API calls 54433->54436 54434 401eea 26 API calls 54434->54436 54436->54428 54436->54430 54436->54431 54436->54432 54436->54433 54436->54434 54437 401eea 26 API calls 54436->54437 54460 41b825 CreateFileW 54436->54460 54468 41b892 CreateFileW SetFilePointer WriteFile CloseHandle 54436->54468 54437->54427 54439 409e44 54438->54439 54441 409dad 54438->54441 54439->54427 54440 409dcc CreateFileW 54440->54441 54442 409dda GetFileSize 54440->54442 54441->54440 54443 409e0f CloseHandle 54441->54443 54444 409e21 54441->54444 54445 409e04 Sleep 54441->54445 54446 409dfd 54441->54446 54442->54441 54442->54443 54443->54441 54444->54439 54448 4082dc 28 API calls 54444->54448 54445->54443 54469 40a7f0 83 API calls 54446->54469 54449 409e3d 54448->54449 54450 4098a5 126 API calls 54449->54450 54450->54439 54452 41b7ad CreateFileW 54451->54452 54454 41b7e6 54452->54454 54455 41b7ea 54452->54455 54454->54427 54456 41b801 WriteFile 54455->54456 54457 41b7f1 SetFilePointer 54455->54457 54458 41b814 54456->54458 54459 41b816 CloseHandle 54456->54459 54457->54456 54457->54459 54458->54459 54459->54454 54461 41b84b 54460->54461 54462 41b84f GetFileSize 54460->54462 54461->54436 54470 401e65 54462->54470 54464 41b863 54465 41b875 ReadFile 54464->54465 54466 41b882 54465->54466 54467 41b884 CloseHandle 54465->54467 54466->54467 54467->54461 54468->54436 54469->54445 54471 401e6d 54470->54471 54473 401e77 54471->54473 54474 4023b7 28 API calls 54471->54474 54473->54464 54474->54473 54477 402d97 54476->54477 54480 4030f7 54477->54480 54479 402dab 54479->54317 54481 403101 54480->54481 54483 403115 54481->54483 54484 4036c2 28 API calls 54481->54484 54483->54479 54484->54483 54488 403dc2 54485->54488 54487 403cc9 54487->54054 54489 403dce 54488->54489 54492 402ffd 54489->54492 54491 403de3 54491->54487 54493 40300e 54492->54493 54494 4032a4 28 API calls 54493->54494 54495 40301a 54494->54495 54497 40302e 54495->54497 54498 4035e8 28 API calls 54495->54498 54497->54491 54498->54497 54505 4397ca 54499->54505 54503 4128ec 54502->54503 54504 4128c5 RegSetValueExA RegCloseKey 54502->54504 54503->54077 54504->54503 54508 43974b 54505->54508 54507 401608 54507->54079 54509 43975a 54508->54509 54510 43976e 54508->54510 54516 445564 20 API calls __dosmaperr 54509->54516 54515 43976a __alldvrm 54510->54515 54518 447811 11 API calls 2 library calls 54510->54518 54513 43975f 54517 43aa37 26 API calls _Deallocate 54513->54517 54515->54507 54516->54513 54517->54515 54518->54515 54527 4470cf GetLastError 54519->54527 54521 40cc64 54522 41a659 54521->54522 54560 43eabc 54522->54560 54525 43eabc 38 API calls 54526 41a66a 54525->54526 54526->54094 54528 4470e5 54527->54528 54529 4470f1 54527->54529 54548 447676 11 API calls 2 library calls 54528->54548 54549 448916 20 API calls 3 library calls 54529->54549 54532 4470eb 54532->54529 54534 44713a SetLastError 54532->54534 54533 4470fd 54535 447105 54533->54535 54556 4476cc 11 API calls 2 library calls 54533->54556 54534->54521 54550 446cd5 54535->54550 54537 44711a 54537->54535 54539 447121 54537->54539 54557 446f41 20 API calls __Tolower 54539->54557 54540 44710b 54541 447146 SetLastError 54540->54541 54558 4455c6 38 API calls _Atexit 54541->54558 54543 44712c 54545 446cd5 _free 20 API calls 54543->54545 54547 447133 54545->54547 54547->54534 54547->54541 54548->54532 54549->54533 54551 446ce0 RtlFreeHeap 54550->54551 54555 446d09 _free 54550->54555 54552 446cf5 54551->54552 54551->54555 54559 445564 20 API calls __dosmaperr 54552->54559 54554 446cfb GetLastError 54554->54555 54555->54540 54556->54537 54557->54543 54559->54554 54561 4470cf __Tolower 38 API calls 54560->54561 54562 41a65f 54561->54562 54562->54525 54566 41acc4 ctype ___scrt_fastfail 54563->54566 54564 401f66 28 API calls 54565 41ad39 54564->54565 54565->54099 54566->54564 54567->54115 54569 414081 54568->54569 54570 41408b getaddrinfo WSASetLastError 54568->54570 54599 413f0f 35 API calls ___std_exception_copy 54569->54599 54570->54122 54572 414086 54572->54570 54600 41ab50 GlobalMemoryStatusEx 54573->54600 54575 41ab8d 54575->54122 54601 41371e 54576->54601 54580 40ccbc ___scrt_fastfail 54579->54580 54581 412735 3 API calls 54580->54581 54582 40ccf2 54581->54582 54583 403b40 28 API calls 54582->54583 54584 40cd03 54583->54584 54584->54122 54586 40cc0d 54585->54586 54587 412546 3 API calls 54586->54587 54588 40cc14 54587->54588 54589 41258f 3 API calls 54588->54589 54590 40cc2c 54588->54590 54589->54590 54590->54122 54591->54122 54593 401f66 28 API calls 54592->54593 54594 40e776 54593->54594 54594->54122 54595->54122 54596->54122 54597->54122 54598->54122 54599->54572 54600->54575 54604 4136f1 54601->54604 54605 413706 ___scrt_initialize_default_local_stdio_options 54604->54605 54608 43e4ed 54605->54608 54611 43b240 54608->54611 54612 43b280 54611->54612 54613 43b268 54611->54613 54612->54613 54615 43b288 54612->54615 54635 445564 20 API calls __dosmaperr 54613->54635 54637 4394ee 38 API calls 2 library calls 54615->54637 54616 43b26d 54636 43aa37 26 API calls _Deallocate 54616->54636 54618 43b298 54638 43b9c6 20 API calls 2 library calls 54618->54638 54622 43b310 54639 43c034 50 API calls 3 library calls 54622->54639 54623 413714 54623->54122 54626 43b31b 54640 43ba30 20 API calls _free 54626->54640 54627 43b278 54628 433f37 54627->54628 54629 433f42 IsProcessorFeaturePresent 54628->54629 54630 433f40 54628->54630 54632 4343b4 54629->54632 54630->54623 54641 434378 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54632->54641 54634 434497 54634->54623 54635->54616 54636->54627 54637->54618 54638->54622 54639->54626 54640->54627 54641->54634 54644 40cd12 54643->54644 54645 403b9e 28 API calls 54644->54645 54646 40ca3a 54645->54646 54647 402860 54646->54647 54651 40286f 54647->54651 54648 4028b1 54656 402daf 54648->54656 54650 4028af 54650->54227 54651->54648 54652 4028a6 54651->54652 54655 402d68 28 API calls 54652->54655 54654->54204 54655->54650 54657 402dbb 54656->54657 54658 4030f7 28 API calls 54657->54658 54659 402dcd 54658->54659 54659->54650 54662 40e642 54660->54662 54661 41258f 3 API calls 54661->54662 54662->54661 54663 40e6e6 54662->54663 54665 40e6d6 Sleep 54662->54665 54680 40e674 54662->54680 54666 4082dc 28 API calls 54663->54666 54664 4082dc 28 API calls 54664->54680 54665->54662 54669 40e6f1 54666->54669 54668 41b013 28 API calls 54668->54680 54670 41b013 28 API calls 54669->54670 54671 40e6fd 54670->54671 54695 41284c 29 API calls 54671->54695 54674 401e13 26 API calls 54674->54680 54675 40e710 54676 401e13 26 API calls 54675->54676 54678 40e71c 54676->54678 54677 401f66 28 API calls 54677->54680 54679 401f66 28 API calls 54678->54679 54681 40e72d 54679->54681 54680->54664 54680->54665 54680->54668 54680->54674 54680->54677 54682 4127aa 29 API calls 54680->54682 54693 40bf04 73 API calls ___scrt_fastfail 54680->54693 54694 41284c 29 API calls 54680->54694 54683 4127aa 29 API calls 54681->54683 54682->54680 54684 40e740 54683->54684 54696 411771 TerminateProcess WaitForSingleObject 54684->54696 54686 40e748 ExitProcess 54697 41170f 61 API calls 54688->54697 54694->54680 54695->54675 54696->54686 54698 43aba8 54699 43abb4 _swprintf ___BuildCatchObject 54698->54699 54700 43abc2 54699->54700 54704 43abec 54699->54704 54716 445564 20 API calls __dosmaperr 54700->54716 54702 43abc7 54717 43aa37 26 API calls _Deallocate 54702->54717 54711 444cdc EnterCriticalSection 54704->54711 54706 43abf7 54712 43ac98 54706->54712 54709 43abd2 __wsopen_s 54711->54706 54713 43aca6 54712->54713 54715 43ac02 54713->54715 54719 448626 39 API calls 2 library calls 54713->54719 54718 43ac1f LeaveCriticalSection std::_Lockit::~_Lockit 54715->54718 54716->54702 54717->54709 54718->54709 54719->54713 54720 402bcc 54721 402bd7 54720->54721 54723 402bdf 54720->54723 54728 403315 54721->54728 54724 402beb 54723->54724 54737 4015d3 54723->54737 54729 4015d3 22 API calls 54728->54729 54730 40332a 54729->54730 54731 402bdd 54730->54731 54732 40333b 54730->54732 54747 43a9bc 26 API calls 3 library calls 54732->54747 54734 43aa56 54748 43aa64 11 API calls _Atexit 54734->54748 54736 43aa63 54739 433818 54737->54739 54738 43aa9c ___std_exception_copy 21 API calls 54738->54739 54739->54738 54740 402be9 54739->54740 54742 433839 std::_Facet_Register 54739->54742 54749 442410 7 API calls 2 library calls 54739->54749 54746 433ff7 std::_Facet_Register 54742->54746 54750 437de7 RaiseException 54742->54750 54745 434014 54751 437de7 RaiseException 54746->54751 54747->54734 54748->54736 54749->54739 54750->54746 54751->54745 54752 414f4c 54767 41a726 54752->54767 54754 414f55 54755 401fbd 28 API calls 54754->54755 54756 414f64 54755->54756 54757 404468 60 API calls 54756->54757 54758 414f70 54757->54758 54759 401eea 26 API calls 54758->54759 54760 414f79 54759->54760 54761 401d8c 26 API calls 54760->54761 54762 4163d6 54761->54762 54763 401eea 26 API calls 54762->54763 54764 4163e2 54763->54764 54765 401eea 26 API calls 54764->54765 54766 4163ee 54765->54766 54768 41a734 54767->54768 54769 43aa9c ___std_exception_copy 21 API calls 54768->54769 54770 41a73e InternetOpenW InternetOpenUrlW 54769->54770 54771 41a767 InternetReadFile 54770->54771 54775 41a78a 54771->54775 54772 41a7b7 InternetCloseHandle InternetCloseHandle 54774 41a7c9 54772->54774 54773 401f86 28 API calls 54773->54775 54774->54754 54775->54771 54775->54772 54775->54773 54776 401eea 26 API calls 54775->54776 54776->54775

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF03
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF0C
                                                                                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF23
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF26
                                                                                                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF38
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF3B
                                                                                                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF4C
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF4F
                                                                                                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D856), ref: 0041BF60
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF63
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D856), ref: 0041BF70
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF73
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D856), ref: 0041BF80
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF83
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D856), ref: 0041BF90
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF93
                                                                                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D856), ref: 0041BFA4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFA7
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D856), ref: 0041BFB4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFB7
                                                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D856), ref: 0041BFC8
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFCB
                                                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D856), ref: 0041BFDC
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFDF
                                                                                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D856), ref: 0041BFF0
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFF3
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D856), ref: 0041C000
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C003
                                                                                                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D856), ref: 0041C011
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C014
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D856), ref: 0041C021
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C024
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D856), ref: 0041C036
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C039
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D856), ref: 0041C046
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C049
                                                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D856), ref: 0041C05B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C05E
                                                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D856), ref: 0041C06B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C06E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$HandleLibraryLoadModule
                                                                                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                • API String ID: 384173800-625181639
                                                                                                • Opcode ID: b0b2e61fc073e98d70dce9ef4f7eaaaad63808f39ef958059982ad015adeb2a9
                                                                                                • Instruction ID: 91c85bc0cfa8e625a7056272f5779649be84715ca0db9f9d819234a6a75bf275
                                                                                                • Opcode Fuzzy Hash: b0b2e61fc073e98d70dce9ef4f7eaaaad63808f39ef958059982ad015adeb2a9
                                                                                                • Instruction Fuzzy Hash: 4C31E2A0E8035C7ADB207BB69CC9F3B7E6DD9847953510427B54893190EB7DEC408EAE

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 5 41742b-417448 6 41744c-4174bf GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5->6 7 4177b3 6->7 8 4174c5-4174cc 6->8 9 4177b5-4177bf 7->9 8->7 10 4174d2-4174d9 8->10 10->7 11 4174df-4174e1 10->11 11->7 12 4174e7-417513 call 436260 * 2 11->12 12->7 17 417519-417524 12->17 17->7 18 41752a-41755a CreateProcessW 17->18 19 417560-417588 VirtualAlloc Wow64GetThreadContext 18->19 20 4177ad GetLastError 18->20 21 417779-4177ab VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 19->21 22 41758e-4175ae ReadProcessMemory 19->22 20->7 21->7 22->21 23 4175b4-4175d4 NtCreateSection 22->23 23->21 24 4175da-4175e7 23->24 25 4175e9-4175f4 NtUnmapViewOfSection 24->25 26 4175fa-41761c NtMapViewOfSection 24->26 25->26 27 41765d-417684 GetCurrentProcess NtMapViewOfSection 26->27 28 41761e-41764c VirtualFree NtClose TerminateProcess 26->28 30 417777 27->30 31 41768a-41768c 27->31 28->7 29 417652-417658 28->29 29->6 30->21 32 417695-4176bc call 435ce0 31->32 33 41768e-417692 31->33 36 4176fc-417706 32->36 37 4176be-4176c8 32->37 33->32 39 417724-417728 36->39 40 417708-41770e 36->40 38 4176cc-4176ef call 435ce0 37->38 49 4176f1-4176f8 38->49 43 41772a-417746 WriteProcessMemory 39->43 44 41774c-417763 Wow64SetThreadContext 39->44 40->39 42 417710-417721 call 417837 40->42 42->39 43->21 47 417748 43->47 44->21 48 417765-417771 ResumeThread 44->48 47->44 48->21 51 417773-417775 48->51 49->36 51->9
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00417472
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00417475
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00417486
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00417489
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041749A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041749D
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004174AE
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004174B1
                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00417552
                                                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041756A
                                                                                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00417580
                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004175A6
                                                                                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004175CC
                                                                                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 004175F4
                                                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00417614
                                                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417626
                                                                                                • NtClose.NTDLL(?), ref: 00417630
                                                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 0041763A
                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00417671
                                                                                                • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041767C
                                                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041773E
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0041775B
                                                                                                • ResumeThread.KERNEL32(?), ref: 00417768
                                                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417780
                                                                                                • GetCurrentProcess.KERNEL32(?), ref: 0041778B
                                                                                                • NtUnmapViewOfSection.NTDLL(00000000), ref: 00417792
                                                                                                • NtClose.NTDLL(?), ref: 0041779C
                                                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 004177A5
                                                                                                • GetLastError.KERNEL32 ref: 004177AD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`#v$ntdll
                                                                                                • API String ID: 3150337530-108836778
                                                                                                • Opcode ID: ca58d074774f4cb3cec8caed2bdcc8ae3fb1cd477b48ba63cf2103ffe40dc484
                                                                                                • Instruction ID: 9d7e092ec3b05a7a521957261ed1896ff906ab06cfb84d00d3f911d9ff722cfe
                                                                                                • Opcode Fuzzy Hash: ca58d074774f4cb3cec8caed2bdcc8ae3fb1cd477b48ba63cf2103ffe40dc484
                                                                                                • Instruction Fuzzy Hash: C3A16D71508304AFD710DF65CD89B6B7BF8FB48345F00082EF699962A1DB75E884CB6A

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1668 4099e4-4099fd 1669 409a63-409a73 GetMessageA 1668->1669 1670 4099ff-409a19 SetWindowsHookExA 1668->1670 1671 409a75-409a8d TranslateMessage DispatchMessageA 1669->1671 1672 409a8f 1669->1672 1670->1669 1675 409a1b-409a61 GetLastError call 41af51 call 404c9e call 401f66 call 41a891 call 401eea 1670->1675 1671->1669 1671->1672 1673 409a91-409a96 1672->1673 1675->1673
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                • String ID: Keylogger initialization failure: error $`#v
                                                                                                • API String ID: 3219506041-3226811161
                                                                                                • Opcode ID: 0705db965a2062ae8a7277aeef9a6f4e665693c4b0740b12373ecf14f71f0162
                                                                                                • Instruction ID: 916e88852ed13b3ab14e3660f0b3d121b0d8821096f38c6baae7fa71b0b7a026
                                                                                                • Opcode Fuzzy Hash: 0705db965a2062ae8a7277aeef9a6f4e665693c4b0740b12373ecf14f71f0162
                                                                                                • Instruction Fuzzy Hash: 6D118271604301AFC710BB7A9C4996B77ECAB94B15B10057EFC45E2191EE34DA01CBAA

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1710 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1717 10001177-1000119e lstrlenW FindFirstFileW 1710->1717 1718 10001168-10001172 lstrlenW 1710->1718 1719 100011a0-100011a8 1717->1719 1720 100011e1-100011e9 1717->1720 1718->1717 1721 100011c7-100011d8 FindNextFileW 1719->1721 1722 100011aa-100011c4 call 10001000 1719->1722 1721->1719 1724 100011da-100011db FindClose 1721->1724 1722->1721 1724->1720
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                • String ID:
                                                                                                • API String ID: 1083526818-0
                                                                                                • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                                APIs
                                                                                                  • Part of subcall function 0041258F: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                                                                                  • Part of subcall function 0041258F: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                                                                                  • Part of subcall function 0041258F: RegCloseKey.KERNEL32(?), ref: 004125D8
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 0040E6DB
                                                                                                • ExitProcess.KERNEL32 ref: 0040E74A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                • String ID: 6.0.0 Pro$override$pth_unenc
                                                                                                • API String ID: 2281282204-4012039065
                                                                                                • Opcode ID: f421cdf6d9c6d8049a3e57c2dc73a36603adb0feb741279f5af10ed514b8101a
                                                                                                • Instruction ID: 41eca1b412dc6cb4cbd69e66e1420b1d2a9bda06de9f36a729d5cd10817e4b5d
                                                                                                • Opcode Fuzzy Hash: f421cdf6d9c6d8049a3e57c2dc73a36603adb0feb741279f5af10ed514b8101a
                                                                                                • Instruction Fuzzy Hash: A821D131F1420027D60876778857B6F399A9B81719F90052EF819A72E7EEBD9E1083DF
                                                                                                APIs
                                                                                                  • Part of subcall function 00410691: SetLastError.KERNEL32(0000000D,00410C10,?,00000000), ref: 00410697
                                                                                                • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410BED), ref: 00410C9C
                                                                                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410D02
                                                                                                • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410D09
                                                                                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410E17
                                                                                                • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410BED), ref: 00410E41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                                • String ID:
                                                                                                • API String ID: 3525466593-0
                                                                                                • Opcode ID: 5b761030cf84cfef50a77e8f1fc708b710696a941d42968a3fbf92de24ca1f36
                                                                                                • Instruction ID: e2f64966b18619331c3eea81ef564f6afd9e4387f8ea08f62d3b86939114ae32
                                                                                                • Opcode Fuzzy Hash: 5b761030cf84cfef50a77e8f1fc708b710696a941d42968a3fbf92de24ca1f36
                                                                                                • Instruction Fuzzy Hash: 8E61E570200305ABD710AF56C981BA77BA5BF84308F04451EF909CB382DBF8E8D5CB99
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(00000001,00474EE0,004755B0,00000000,?,?,?,?,?,00414F1C,?,00000001), ref: 00404946
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,004755B0,00000000,?,?,?,?,?,00414F1C,?,00000001), ref: 00404994
                                                                                                • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                                                Strings
                                                                                                • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$EventLocalThreadTime
                                                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                                                • API String ID: 2532271599-1507639952
                                                                                                • Opcode ID: 11dcb81736bd5a79a2aa2ca3fb13e8e3923cac80840f1d56957b744663747659
                                                                                                • Instruction ID: 334fa9fd2124ebc6c4f40b6d461b17bc354faf393a4ed588a06a33f3771f6744
                                                                                                • Opcode Fuzzy Hash: 11dcb81736bd5a79a2aa2ca3fb13e8e3923cac80840f1d56957b744663747659
                                                                                                • Instruction Fuzzy Hash: 1611E3B19052547ACB10A7BA8849BDB7F9CAB86364F00007FF50462292DA789845CBFA
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                • SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                • recv.WS2_32(?,?,?,00000000), ref: 0040459F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventObjectSingleWaitrecv
                                                                                                • String ID:
                                                                                                • API String ID: 311754179-0
                                                                                                • Opcode ID: e9776599d1ec220d30db4bf84b70fc35cad7659389b29cba8a531b5175ba4202
                                                                                                • Instruction ID: 6eb9ccf7f7f4a74ce0fca17a02289a90418c2efed9003feaedd78b13c881e648
                                                                                                • Opcode Fuzzy Hash: e9776599d1ec220d30db4bf84b70fc35cad7659389b29cba8a531b5175ba4202
                                                                                                • Instruction Fuzzy Hash: ABF08236108612BFD7015B10EC08E1AFBA2FB88721F20862EF611612A19F71EC21DB59
                                                                                                APIs
                                                                                                • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750FC), ref: 0041A9CA
                                                                                                • GetUserNameW.ADVAPI32(?,0040E096), ref: 0041A9E2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Name$ComputerUser
                                                                                                • String ID:
                                                                                                • API String ID: 4229901323-0
                                                                                                • Opcode ID: c38e36c8d41ee46761b6a4ad2d0e2b40601694a6c822a335d006f55048ef3fa5
                                                                                                • Instruction ID: dd4171341b6269d20eef4dfb17ad31a68228dcd82fcdc0eb213b330dd994abd5
                                                                                                • Opcode Fuzzy Hash: c38e36c8d41ee46761b6a4ad2d0e2b40601694a6c822a335d006f55048ef3fa5
                                                                                                • Instruction Fuzzy Hash: 16014F7290011CAADB00EB90DC49ADDBB7CEF44315F10016AB502B3195EFB4AB898A98
                                                                                                APIs
                                                                                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004146BA,00474EE0,00475A38,00474EE0,00000000,00474EE0,?,00474EE0,6.0.0 Pro), ref: 0040E765
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2299586839-0
                                                                                                • Opcode ID: 421515283829ddc35b956787f58d423e39949e6c6887f96e861c6dca66fe8524
                                                                                                • Instruction ID: 426317967f55bc2b8d076a22fb2a8dcf1c85f3a8f112093483d3870effb55d88
                                                                                                • Opcode Fuzzy Hash: 421515283829ddc35b956787f58d423e39949e6c6887f96e861c6dca66fe8524
                                                                                                • Instruction Fuzzy Hash: A6D05E607002197BEA109691CC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF048AE1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 52 40d83a-40d8bc call 41beee GetModuleFileNameW call 40e240 call 401fbd * 2 call 41b1ce call 40e995 call 401d8c call 43ea30 69 40d908-40d9d0 call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 52->69 70 40d8be-40d903 call 40ea5e call 401d64 call 401e8f call 40fd92 call 40ea0f call 40e22d 52->70 116 40d9d2-40da1d call 4085b4 call 401eef call 401eea call 401e8f call 41258f 69->116 117 40da23-40da3e call 401d64 call 40b125 69->117 95 40dd69-40dd7a call 401eea 70->95 116->117 149 40e20c-40e22c call 401e8f call 4129da call 41138d 116->149 126 40da40-40da5f call 401e8f call 41258f 117->126 127 40da78-40da7f call 40bed7 117->127 126->127 145 40da61-40da77 call 401e8f call 4129da 126->145 137 40da81-40da83 127->137 138 40da88-40da8f 127->138 143 40dd68 137->143 139 40da91 138->139 140 40da93-40da9f call 41a66e 138->140 139->140 150 40daa1-40daa3 140->150 151 40daa8-40daac 140->151 143->95 145->127 150->151 154 40daeb-40dafe call 401d64 call 401e8f 151->154 155 40daae call 40697b 151->155 175 40db00 call 4069ba 154->175 176 40db05-40db8d call 401d64 call 41b013 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 154->176 164 40dab3-40dab5 155->164 168 40dac1-40dad4 call 401d64 call 401e8f 164->168 169 40dab7-40dabc call 40699d call 4064d0 164->169 168->154 185 40dad6-40dadc 168->185 169->168 175->176 210 40dbf5-40dbf9 176->210 211 40db8f-40dba8 call 401d64 call 401e8f call 43a821 176->211 185->154 187 40dade-40dae4 185->187 187->154 189 40dae6 call 4064d0 187->189 189->154 212 40dd7d-40ddd4 call 436260 call 4022f8 call 401e8f * 2 call 412735 call 4082d7 210->212 213 40dbff-40dc06 210->213 211->210 235 40dbaa-40dbf0 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 211->235 266 40ddd9-40de2f call 401d64 call 401e8f call 401f66 call 401e8f call 4127aa call 401d64 call 401e8f call 43a7f7 212->266 215 40dc84-40dc8e call 4082d7 213->215 216 40dc08-40dc82 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 213->216 225 40dc93-40dcb7 call 4022f8 call 433ad3 215->225 216->225 246 40dcc6 225->246 247 40dcb9-40dcc4 call 436260 225->247 235->210 250 40dcc8-40dd13 call 401e07 call 43e559 call 4022f8 call 401e8f call 4022f8 call 401e8f call 41297a 246->250 247->250 304 40dd18-40dd3d call 433adc call 401d64 call 40b125 250->304 319 40de31 266->319 320 40de4c-40de4e 266->320 304->266 321 40dd43-40dd64 call 401d64 call 41b013 call 40e2f1 304->321 322 40de33-40de4a call 41c0bb CreateThread 319->322 323 40de50-40de52 320->323 324 40de54 320->324 321->266 339 40dd66 321->339 327 40de5a-40df39 call 401f66 * 2 call 41a891 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a7f7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 322->327 323->322 324->327 377 40df74 327->377 378 40df3b-40df72 call 433818 call 401d64 call 401e8f CreateThread 327->378 339->143 380 40df76-40df8e call 401d64 call 401e8f 377->380 378->380 389 40df90-40dfc7 call 433818 call 401d64 call 401e8f CreateThread 380->389 390 40dfcc-40dfdf call 401d64 call 401e8f 380->390 389->390 401 40dfe1-40e03a call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 390->401 402 40e03f-40e052 call 401d64 call 401e8f 390->402 401->402 412 40e054-40e088 call 401d64 call 401e8f call 401d64 call 401e8f call 43a7f7 call 40b95c 402->412 413 40e08d-40e0b1 call 41a9ad call 401e18 call 401e13 402->413 412->413 433 40e0b3-40e0b4 SetProcessDEPPolicy 413->433 434 40e0b6-40e0c9 CreateThread 413->434 433->434 437 40e0d7-40e0de 434->437 438 40e0cb-40e0d5 CreateThread 434->438 441 40e0e0-40e0ea CreateThread 437->441 442 40e0ec-40e0f3 437->442 438->437 441->442 445 40e0f5-40e0f8 442->445 446 40e106-40e10b 442->446 448 40e146-40e161 call 401e8f call 412546 445->448 449 40e0fa-40e104 445->449 451 40e110-40e141 call 401f66 call 404c9e call 401f66 call 41a891 call 401eea 446->451 461 40e167-40e1a7 call 41b013 call 401e07 call 41265c call 401e13 call 401e07 448->461 462 40e1fd-40e207 call 40cbac call 40cc37 call 4140ac 448->462 449->451 451->448 482 40e1c0-40e1c5 DeleteFileW 461->482 462->149 483 40e1c7-40e1f8 call 41b013 call 401e07 call 412a52 call 401e13 * 2 482->483 484 40e1a9-40e1ac 482->484 483->462 484->483 485 40e1ae-40e1bb Sleep call 401e07 484->485 485->482
                                                                                                APIs
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF03
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF0C
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF23
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF26
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF38
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF3B
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF4C
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF4F
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D856), ref: 0041BF60
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF63
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D856), ref: 0041BF70
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF73
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D856), ref: 0041BF80
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF83
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D856), ref: 0041BF90
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF93
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D856), ref: 0041BFA4
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFA7
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D856), ref: 0041BFB4
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFB7
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D856), ref: 0041BFC8
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFCB
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D856), ref: 0041BFDC
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFDF
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D856), ref: 0041BFF0
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFF3
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D856), ref: 0041C000
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041C003
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D856), ref: 0041C011
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\plugmancrypted.exe,00000104), ref: 0040D863
                                                                                                  • Part of subcall function 0040FD92: __EH_prolog.LIBCMT ref: 0040FD97
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                • String ID: SG$0TG$Access Level: $Administrator$C:\Users\user\Desktop\plugmancrypted.exe$Exe$Exe$Inj$PSG$PSG$Remcos Agent initialized$Rmc-OH1QS4$Software\$User$dMG$del$del$exepath$hSG$licence$license_code.txt
                                                                                                • API String ID: 2830904901-3852369267
                                                                                                • Opcode ID: 8a76005bc79075ddcf2df4b62eeda7078934c04a16a7f75cd15d740b6ce3b9e5
                                                                                                • Instruction ID: b96e9d53b64ce9762df997b7c443b274fb73bccd3fe431706256fac2145036cf
                                                                                                • Opcode Fuzzy Hash: 8a76005bc79075ddcf2df4b62eeda7078934c04a16a7f75cd15d740b6ce3b9e5
                                                                                                • Instruction Fuzzy Hash: 2E32C760B043406ADA14B776DC57BBE259A9F81748F00483FB9467B2E2DEBC9D44C39E

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 496 4140ac-4140f7 call 401faa call 41ac7e call 401faa call 401d64 call 401e8f call 43a7f7 509 414106-414154 call 401f66 call 401d64 call 401fbd call 41b1ce call 404262 call 401d64 call 40b125 496->509 510 4140f9-414100 Sleep 496->510 525 414156-4141c5 call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 509->525 526 4141c8-414262 call 401f66 call 401d64 call 401fbd call 41b1ce call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 509->526 510->509 525->526 579 414272-414279 526->579 580 414264-414270 526->580 581 41427e-41431a call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a891 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 414072 579->581 580->581 608 414367-414375 call 4041f1 581->608 609 41431c-414362 WSAGetLastError call 41be81 call 404c9e call 401f66 call 41a891 call 401eea 581->609 614 4143a2-4143b7 call 404915 call 40428c 608->614 615 414377-41439d call 401f66 * 2 call 41a891 608->615 631 414ce6-414cf8 call 4047eb call 4020b4 609->631 614->631 632 4143bd-41450a call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a891 call 401eea * 4 call 41ab78 call 41375b call 4082dc call 440e5e call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 412735 614->632 615->631 645 414d20-414d28 call 401d8c 631->645 646 414cfa-414d1a call 401d64 call 401e8f call 43a7f7 Sleep 631->646 696 41450c-414519 call 40541d 632->696 697 41451e-414545 call 401e8f call 4125eb 632->697 645->526 646->645 696->697 703 414547-414549 697->703 704 41454c-414c4d call 403b40 call 41aff9 call 40cc9a call 41b0d3 call 40cbf1 call 41aff9 call 41b0d3 call 41af51 call 401d64 GetTickCount call 41af51 call 41aeab call 41af51 * 2 call 41ae5d call 41b0d3 * 5 call 40e751 call 41b0d3 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 4027cb call 40275c call 4027cb call 40275c call 404468 call 401eea * 54 call 401e13 call 401eea * 7 call 401e13 call 401eea call 401e13 call 4045d5 697->704 703->704 977 414c52-414c59 704->977 978 414c5b-414c62 977->978 979 414c6d-414c74 977->979 978->979 980 414c64-414c66 978->980 981 414c80-414cb2 call 405415 call 401f66 * 2 call 41a891 979->981 982 414c76-414c7b call 40a767 979->982 980->979 993 414cb4-414cc0 CreateThread 981->993 994 414cc6-414ce1 call 401eea * 2 call 401e13 981->994 982->981 993->994 994->631
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000000,00000029,00475308,?,00000000), ref: 00414100
                                                                                                • WSAGetLastError.WS2_32 ref: 00414321
                                                                                                • Sleep.KERNEL32(00000000,00000002), ref: 00414D1A
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$ErrorLastLocalTime
                                                                                                • String ID: | $%I64u$6.0.0 Pro$C:\Users\user\Desktop\plugmancrypted.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$PhNG$Rmc-OH1QS4$TLS Off$TLS On $dMG$hSG$hlight$name$NG$NG$UG$VG
                                                                                                • API String ID: 524882891-1945630219
                                                                                                • Opcode ID: 755c4276773dfd525db6e4df9d147f60c2015d937c96535b326cb50e5e6a6ac2
                                                                                                • Instruction ID: c3263a97f07b8ae9d11225c8127e62ab27a72c03ae3a8f764161ebb565a1ac44
                                                                                                • Opcode Fuzzy Hash: 755c4276773dfd525db6e4df9d147f60c2015d937c96535b326cb50e5e6a6ac2
                                                                                                • Instruction Fuzzy Hash: EE625E71A001145ACB18F771DDA6AEE73659FA0308F1041BFB80A771E2EF785E85CA9D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1001 411d59-411da2 GetModuleFileNameW call 401faa * 3 1008 411da4-411e2e call 41ad43 call 401e8f call 40c854 call 401eea call 41ad43 call 401e8f call 40c854 call 401eea call 41ad43 call 401e8f call 40c854 call 401eea 1001->1008 1033 411e30-411ec0 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 41789c call 401e13 * 4 1008->1033 1056 411ed0 1033->1056 1057 411ec2-411eca Sleep 1033->1057 1058 411ed2-411f62 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 41789c call 401e13 * 4 1056->1058 1057->1033 1057->1056 1081 411f72 1058->1081 1082 411f64-411f6c Sleep 1058->1082 1083 411f74-412004 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 41789c call 401e13 * 4 1081->1083 1082->1058 1082->1081 1106 412014-412038 1083->1106 1107 412006-41200e Sleep 1083->1107 1108 41203c-412058 call 401e07 call 41b825 1106->1108 1107->1083 1107->1106 1113 41205a-412069 call 401e07 DeleteFileW 1108->1113 1114 41206f-41208b call 401e07 call 41b825 1108->1114 1113->1114 1121 4120a8 1114->1121 1122 41208d-4120a6 call 401e07 DeleteFileW 1114->1122 1124 4120ac-4120c8 call 401e07 call 41b825 1121->1124 1122->1124 1130 4120e2-4120e4 1124->1130 1131 4120ca-4120dc call 401e07 DeleteFileW 1124->1131 1133 4120f1-4120fc Sleep 1130->1133 1134 4120e6-4120e8 1130->1134 1131->1130 1133->1108 1137 412102-412114 call 408339 1133->1137 1134->1133 1136 4120ea-4120ef 1134->1136 1136->1133 1136->1137 1140 412116-412124 call 408339 1137->1140 1141 41216a-412189 call 401e13 * 3 1137->1141 1140->1141 1147 412126-412134 call 408339 1140->1147 1152 41218e-4121f7 call 40b027 call 401e07 call 401fbd call 4124cf call 401e13 call 405422 1141->1152 1147->1141 1153 412136-412162 Sleep call 401e13 * 3 1147->1153 1173 4121fd-412347 call 41b0d3 call 41af51 call 4027ec call 4027cb * 6 call 40275c call 4027cb call 40275c call 404468 call 401eea * 10 1152->1173 1174 41234c-4123f3 call 41b0d3 call 4027ec call 4027cb * 6 call 40275c call 404468 1152->1174 1153->1008 1167 412168 1153->1167 1167->1152 1244 412447-4124bf call 401eea call 401e13 call 401eea * 9 1173->1244 1213 4123f8-412443 call 401eea * 7 1174->1213 1213->1244 1277 4124c4-4124ce 1244->1277
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411D72
                                                                                                  • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00466324), ref: 004178B2
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32($cF,?,?,00403AB9,00466324), ref: 004178BB
                                                                                                • Sleep.KERNEL32(0000000A,00466324), ref: 00411EC4
                                                                                                • Sleep.KERNEL32(0000000A,00466324,00466324), ref: 00411F66
                                                                                                • Sleep.KERNEL32(0000000A,00466324,00466324,00466324), ref: 00412008
                                                                                                • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 00412069
                                                                                                • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 004120A0
                                                                                                • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 004120DC
                                                                                                • Sleep.KERNEL32(000001F4,00466324,00466324,00466324), ref: 004120F6
                                                                                                • Sleep.KERNEL32(00000064), ref: 00412138
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                • String ID: /stext "$HTG$HTG$NG$NG
                                                                                                • API String ID: 1223786279-556891652
                                                                                                • Opcode ID: 39e117f4544f4708a8805252e5c2510e422cf37abbe6357aeabd797b1f6563e7
                                                                                                • Instruction ID: b666a026b41db1aee680f36e7b950d376c2ae40a85d54f66cdb5da2431d4b1f1
                                                                                                • Opcode Fuzzy Hash: 39e117f4544f4708a8805252e5c2510e422cf37abbe6357aeabd797b1f6563e7
                                                                                                • Instruction Fuzzy Hash: F00224315083414AD324FB61D891BEFB7D5AFD4308F50493EF88A931E2EF785A49C69A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                  • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                  • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                  • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                  • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                • String ID: )$Foxmail$ProgramFiles
                                                                                                • API String ID: 672098462-2938083778
                                                                                                • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                                • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                • String ID: [${ User has been idle for $ minutes }$<mG$<mG$<mG$]
                                                                                                • API String ID: 911427763-3636820255
                                                                                                • Opcode ID: 085a6d054ddff4183cfd8317ec61d5efa0c9af1f2f044ccafb8d0972797aef7a
                                                                                                • Instruction ID: ab9145b4e211f5f3da3af6290e6e7a2c9d96cae7f6b46a2c86e206227f6ebbf0
                                                                                                • Opcode Fuzzy Hash: 085a6d054ddff4183cfd8317ec61d5efa0c9af1f2f044ccafb8d0972797aef7a
                                                                                                • Instruction Fuzzy Hash: 1951D0716043409BC324FB25D886AAE7795AF84718F00093FF446A32E2DF7C9E55868F

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1396 40428c-4042ad connect 1397 4043e1-4043e5 1396->1397 1398 4042b3-4042b6 1396->1398 1401 4043e7-4043f5 WSAGetLastError 1397->1401 1402 40445f 1397->1402 1399 4043da-4043dc 1398->1399 1400 4042bc-4042bf 1398->1400 1403 404461-404465 1399->1403 1404 4042c1-4042e8 call 404cbf call 401f66 call 41a891 1400->1404 1405 4042eb-4042f5 call 42035c 1400->1405 1401->1402 1406 4043f7-4043fa 1401->1406 1402->1403 1404->1405 1416 404306-404313 call 42057e 1405->1416 1417 4042f7-404301 1405->1417 1409 404439-40443e 1406->1409 1410 4043fc-404437 call 41be81 call 404c9e call 401f66 call 41a891 call 401eea 1406->1410 1412 404443-40445c call 401f66 * 2 call 41a891 1409->1412 1410->1402 1412->1402 1430 404315-404338 call 401f66 * 2 call 41a891 1416->1430 1431 40434c-404357 call 42113f 1416->1431 1417->1412 1457 40433b-404347 call 42039c 1430->1457 1442 404389-404396 call 4204f5 1431->1442 1443 404359-404387 call 401f66 * 2 call 41a891 call 42079d 1431->1443 1453 404398-4043bb call 401f66 * 2 call 41a891 1442->1453 1454 4043be-4043d7 CreateEventW * 2 1442->1454 1443->1457 1453->1454 1454->1399 1457->1402
                                                                                                APIs
                                                                                                • connect.WS2_32(?,00C59578,00000010), ref: 004042A5
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                                • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                • API String ID: 994465650-2151626615
                                                                                                • Opcode ID: 0adbb9b41299ad472e72da1f19d9f68a9d9ea51f5cd2572c9d011672fdfac3b6
                                                                                                • Instruction ID: 8d860672b69a19ae3c360ccb47b0a38bc4e99592ce22fc56bfe6acc5d0e7da0a
                                                                                                • Opcode Fuzzy Hash: 0adbb9b41299ad472e72da1f19d9f68a9d9ea51f5cd2572c9d011672fdfac3b6
                                                                                                • Instruction Fuzzy Hash: D54109B0B0020277CA04B77A884766E7A55AB85314B80012FE901A7AD3FE3DAD2587DF

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                • String ID:
                                                                                                • API String ID: 3658366068-0
                                                                                                • Opcode ID: 0962e5985aceae85a5c94cde7029e24ad356a8ace8c6bfbca5ef33fdb60659b2
                                                                                                • Instruction ID: bab6184e8302d1d457a53eef1949a11c31841f7ba2aeead181e9cd14b25d2afd
                                                                                                • Opcode Fuzzy Hash: 0962e5985aceae85a5c94cde7029e24ad356a8ace8c6bfbca5ef33fdb60659b2
                                                                                                • Instruction Fuzzy Hash: 21212C71100F149FC6216B26DC05A17BBE1EF40325F104A6EE2A622AF2CF35F851DB4C

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1488 40c89e-40c8c3 call 401e52 1491 40c8c9 1488->1491 1492 40c9ed-40ca85 call 401e07 GetLongPathNameW call 403b40 * 2 call 40cd0a call 402860 * 2 call 401e13 * 5 1488->1492 1494 40c8d0-40c8d5 1491->1494 1495 40c9c2-40c9c7 1491->1495 1496 40c905-40c90a 1491->1496 1497 40c9d8 1491->1497 1498 40c9c9-40c9ce call 43ae1f 1491->1498 1499 40c8da-40c8e8 call 41a956 call 401e18 1491->1499 1500 40c8fb-40c900 1491->1500 1501 40c9bb-40c9c0 1491->1501 1502 40c90f-40c916 call 41b366 1491->1502 1504 40c9dd-40c9e2 call 43ae1f 1494->1504 1495->1504 1496->1504 1497->1504 1512 40c9d3-40c9d6 1498->1512 1519 40c8ed 1499->1519 1500->1504 1501->1504 1516 40c918-40c968 call 403b40 call 43ae1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1502->1516 1517 40c96a-40c9b6 call 403b40 call 43ae1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1502->1517 1518 40c9e3-40c9e8 call 4082d7 1504->1518 1512->1497 1512->1518 1524 40c8f1-40c8f6 call 401e13 1516->1524 1517->1519 1518->1492 1519->1524 1524->1492
                                                                                                APIs
                                                                                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LongNamePath
                                                                                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                • API String ID: 82841172-425784914
                                                                                                • Opcode ID: 8058316647152c20abd1cdabdfa83951e42b6909899b53d80ef63206f3cf228c
                                                                                                • Instruction ID: f058a63a2e06dcb2b247864a9289bab0e783a4957c20bc3838a58b63f1508e50
                                                                                                • Opcode Fuzzy Hash: 8058316647152c20abd1cdabdfa83951e42b6909899b53d80ef63206f3cf228c
                                                                                                • Instruction Fuzzy Hash: F0415C721482009AC214F721DC97DAFB7A4AE90759F10063FF546720E2EE7CAA59C69F

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                                  • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                  • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                  • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                  • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                • String ID: PSG$PSG
                                                                                                • API String ID: 3795512280-3836871860
                                                                                                • Opcode ID: 8da95896e009f77ed567cab51f838ecf2d7876fc8a9125838b4e2741328b5565
                                                                                                • Instruction ID: 2e46ee78bd67d64478951c63fc585b7447d0c94e1b250d5b4a4871e09aa14890
                                                                                                • Opcode Fuzzy Hash: 8da95896e009f77ed567cab51f838ecf2d7876fc8a9125838b4e2741328b5565
                                                                                                • Instruction Fuzzy Hash: 68517F716043005ACB05BB71C866ABF779AAF81309F00453FF886B71E2DE7D9D45C69A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                                                                                  • Part of subcall function 0041B366: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B37E
                                                                                                  • Part of subcall function 004125EB: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                                                                                  • Part of subcall function 004125EB: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                                                                                  • Part of subcall function 004125EB: RegCloseKey.KERNEL32(?), ref: 00412637
                                                                                                • StrToIntA.SHLWAPI(00000000,0046CC58,?,00000000,00000000,004750FC,00000003,Exe,00000000,0000000E,00000000,0046656C,00000003,00000000), ref: 0041A6E4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                • String ID: (32 bit)$ (64 bit)$8ZG$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                • API String ID: 782494840-1475859423
                                                                                                • Opcode ID: e520a725449f65e130fd56fce267789cb7ec39629bd6074cb7f3bda9f0e80a96
                                                                                                • Instruction ID: 1adcdd06a104af508aeef54d465e0c78d2d81651f2e3fe11076ab4bcd17b792f
                                                                                                • Opcode Fuzzy Hash: e520a725449f65e130fd56fce267789cb7ec39629bd6074cb7f3bda9f0e80a96
                                                                                                • Instruction Fuzzy Hash: 1811C660A001012AC704B3A6DCDBDBF765A9B91304F44413FB856A71E2FB6C9D9583EE

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A749
                                                                                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A75F
                                                                                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A778
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 0041A7BE
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 0041A7C1
                                                                                                Strings
                                                                                                • http://geoplugin.net/json.gp, xrefs: 0041A759
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                • String ID: http://geoplugin.net/json.gp
                                                                                                • API String ID: 3121278467-91888290
                                                                                                • Opcode ID: 329e4957aebaa88e918474c930bec9701385fdb26db1044c04e8e800d0e51c2d
                                                                                                • Instruction ID: dd066ffe0ad47051801ff1a9504fa95a24023bf504f9cdcf24902ddc36d2e50e
                                                                                                • Opcode Fuzzy Hash: 329e4957aebaa88e918474c930bec9701385fdb26db1044c04e8e800d0e51c2d
                                                                                                • Instruction Fuzzy Hash: C311947110A3126BD624EB169C85DBF7BECEF86765F00043EF845A2191DF68D848C6BA
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                  • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                  • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                  • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2099061454-0
                                                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleSizeSleep
                                                                                                • String ID: pQG
                                                                                                • API String ID: 1958988193-3769108836
                                                                                                • Opcode ID: a8be8c16880439c766c810802cad88d1de10d530097162c07d361957ed4d994b
                                                                                                • Instruction ID: 007c54a35b5ab6fada7f5b2b4f31fda992404cc28ee9ac254c5285dcec39f6dc
                                                                                                • Opcode Fuzzy Hash: a8be8c16880439c766c810802cad88d1de10d530097162c07d361957ed4d994b
                                                                                                • Instruction Fuzzy Hash: 0911E730640B406AE720E724D88972F7B9AAB81316F44047EF18566AE3CA799CD5C29D
                                                                                                APIs
                                                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004127B9
                                                                                                • RegSetValueExA.KERNEL32(?,XwF,00000000,?,00000000,00000000,00475308,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127E1
                                                                                                • RegCloseKey.KERNEL32(?,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: XwF$pth_unenc
                                                                                                • API String ID: 1818849710-1649331827
                                                                                                • Opcode ID: 854dfcf369f7f99379ce4f1d9c0c988a9feebf043b28966136932bd7adfa03a6
                                                                                                • Instruction ID: b42ea712bc7a6ff48bd64609183fdbccf638e423d93a2202917fd6756948167f
                                                                                                • Opcode Fuzzy Hash: 854dfcf369f7f99379ce4f1d9c0c988a9feebf043b28966136932bd7adfa03a6
                                                                                                • Instruction Fuzzy Hash: 27F06D32140204BBCB00AFA1DD45AEF3768EF00751B108169B916B60A1EE759E04EBA4
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                  • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                  • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                  • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                  • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2099061454-0
                                                                                                • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                APIs
                                                                                                • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 2152742572-0
                                                                                                • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                APIs
                                                                                                • send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                • WaitForSingleObject.KERNEL32(00000000,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                                                                                • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventObjectSingleWaitsend
                                                                                                • String ID: {NAL
                                                                                                • API String ID: 3963590051-1903569844
                                                                                                • Opcode ID: f36c32b76c9051a5490292015b64d18323217a15f1daa9e360ce1b81820376dc
                                                                                                • Instruction ID: 09920f02ef31e30e393b68ef0c8285e211ae926702cc5adcda46913b737bad1c
                                                                                                • Opcode Fuzzy Hash: f36c32b76c9051a5490292015b64d18323217a15f1daa9e360ce1b81820376dc
                                                                                                • Instruction Fuzzy Hash: 552137B29005156BCF04ABA5DC96DEE777CBF54358B00413EF916B21E1EE78A504C6E4
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateThread$LocalTimewsprintf
                                                                                                • String ID: Offline Keylogger Started
                                                                                                • API String ID: 465354869-4114347211
                                                                                                • Opcode ID: b7d4faf1a87e98e14e48f1635577099d452690b28fe79286aac47725a7b517a2
                                                                                                • Instruction ID: 15e43fcc554e39227c644a0273f32637653ac1eeca6ef832bd6c9a92d0497390
                                                                                                • Opcode Fuzzy Hash: b7d4faf1a87e98e14e48f1635577099d452690b28fe79286aac47725a7b517a2
                                                                                                • Instruction Fuzzy Hash: 0A1198B15003097AD224BA36CC86DBF7A5CDA813A8B40053EB845622D3EA785E14C6FB
                                                                                                APIs
                                                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                • RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: TeF
                                                                                                • API String ID: 1818849710-331424825
                                                                                                • Opcode ID: 69388a3f5ca785ef31159ee28a7932d701a8b17d3c2adace4bd37096d90c6bf5
                                                                                                • Instruction ID: 5082c9e4fe043c0a9a82c1e0a3a4def458545ef8caf92c2e29ea1f35f3ad8a86
                                                                                                • Opcode Fuzzy Hash: 69388a3f5ca785ef31159ee28a7932d701a8b17d3c2adace4bd37096d90c6bf5
                                                                                                • Instruction Fuzzy Hash: C9E03971640308BFDF119B919C05FDB3BA8EB04B95F004165FA05F61A1DAB1DE18EBA8
                                                                                                APIs
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 3360349984-0
                                                                                                • Opcode ID: 55941151f26434fa36dee778784cd54b51645931168aecef87298d27b3491793
                                                                                                • Instruction ID: 5371640f48c6a0368c7cea64887978d4ac2a240c02499e3407376e9d4191e8ff
                                                                                                • Opcode Fuzzy Hash: 55941151f26434fa36dee778784cd54b51645931168aecef87298d27b3491793
                                                                                                • Instruction Fuzzy Hash: 10417171504301ABC700FB61CC55D7FBBE9AFD5315F00093EF892A32E2EE389909866A
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B7F6
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B80A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0041B817
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandlePointerWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3604237281-0
                                                                                                • Opcode ID: 801f75d00fac8da0c66411ebabb5881698d5c73b15829ac97cd3568d121a9cb6
                                                                                                • Instruction ID: fca0af3f27241acfb9d15a16a542bc487c24adb9e916811621f81636ea96e045
                                                                                                • Opcode Fuzzy Hash: 801f75d00fac8da0c66411ebabb5881698d5c73b15829ac97cd3568d121a9cb6
                                                                                                • Instruction Fuzzy Hash: 1501F5712052057FE6105E249CC9EBB739CEB82B75F10063EF662D23C1DB25CC8686B9
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B852
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B877
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0041B885
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 3919263394-0
                                                                                                • Opcode ID: 1a21255b847fbe2e331c6b2f646a75e08c9959ae533a89512b896340747af4bf
                                                                                                • Instruction ID: 2a104a3335fe37b36386f9496d9e2b25d881a91c22a4f34d2042fa75e5cfbfce
                                                                                                • Opcode Fuzzy Hash: 1a21255b847fbe2e331c6b2f646a75e08c9959ae533a89512b896340747af4bf
                                                                                                • Instruction Fuzzy Hash: 47F0C2B12422047FE6102F25AC89FBF3A5CDB86BA9F10023EF801A2291DE258C0581B9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CountEventTick
                                                                                                • String ID: NG
                                                                                                • API String ID: 180926312-1651712548
                                                                                                • Opcode ID: 4145be1c69f03a66533ffd0647deef8a1195295013427b88b1d2e94042d23b08
                                                                                                • Instruction ID: 085b2f02be9ab0868ba51c73fb921716b1faa5b055701b3286f453889ed4f7a0
                                                                                                • Opcode Fuzzy Hash: 4145be1c69f03a66533ffd0647deef8a1195295013427b88b1d2e94042d23b08
                                                                                                • Instruction Fuzzy Hash: C85182321042409AC624FB71D8A2AEF73E5AFD0304F00453FB94A671E2EF789949C69E
                                                                                                APIs
                                                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040DA7D,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046656C,00000003,00000000), ref: 0040BEE6
                                                                                                • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastMutex
                                                                                                • String ID: Rmc-OH1QS4
                                                                                                • API String ID: 1925916568-994724
                                                                                                • Opcode ID: b5077f7ec388620cf5be0ca51e32a1ab35e6e66f7e0f9972a02b1c78fa9675f2
                                                                                                • Instruction ID: 2210f0ff69d3cac9d22e7a3f14049619627ec1602d204fa864a150733b7892bf
                                                                                                • Opcode Fuzzy Hash: b5077f7ec388620cf5be0ca51e32a1ab35e6e66f7e0f9972a02b1c78fa9675f2
                                                                                                • Instruction Fuzzy Hash: B9D012702057009BE70817709D4E76D3951D784703F00407DB90BE51E1CEA488409519
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                                                                                • RegCloseKey.KERNEL32(?), ref: 00412637
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: a01adbe8d93d7843240e1245e145c4eb73053e88c38affbd61dab3a9f8b8539c
                                                                                                • Instruction ID: 14faf112d3046a25d46051106a5b1d66d342437105d793e51b0bcc882fecfd0c
                                                                                                • Opcode Fuzzy Hash: a01adbe8d93d7843240e1245e145c4eb73053e88c38affbd61dab3a9f8b8539c
                                                                                                • Instruction Fuzzy Hash: D8F0D176900118BBCB209B91DD09EDF7B7CEB44B50F00406ABA05F2190DA749E599BA8
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                                                                                • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                                                                                • RegCloseKey.KERNEL32(00000000), ref: 00412775
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: 2290404c5028f19351fda844a65f428930317fa0cea8d3593e6495ca7ac6aa60
                                                                                                • Instruction ID: 218a6bf298efa18a53fa985214dbde7e418f837aa6fd6996b0f70a828ecfe766
                                                                                                • Opcode Fuzzy Hash: 2290404c5028f19351fda844a65f428930317fa0cea8d3593e6495ca7ac6aa60
                                                                                                • Instruction Fuzzy Hash: 6501AD35800229BFDF215F91DC09DDF7F38EF05760F004065BA08A20A0EB3589A9DBA4
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                                                                                • RegCloseKey.KERNEL32(?), ref: 004125D8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: f2bc15ec1dd87dd5d2b8e96f704feec537dddf8cd8f352820b88cb246238aa27
                                                                                                • Instruction ID: f1b1b21d3432ee16d2560aa6e8f8b6fc3b679f7482eced78fea8614e15db81c1
                                                                                                • Opcode Fuzzy Hash: f2bc15ec1dd87dd5d2b8e96f704feec537dddf8cd8f352820b88cb246238aa27
                                                                                                • Instruction Fuzzy Hash: B4F03075A00208BFDF119FA09C45FDEBBB8EB04B55F104065FA05F6191D670DA54DB94
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004670E0), ref: 0041255D
                                                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004670E0), ref: 00412571
                                                                                                • RegCloseKey.KERNEL32(?,?,?,0040B996,004670E0), ref: 0041257C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: 90b816baf6681459c689896bd7ee7621983de5913a9f55156db5b466bfdb1e74
                                                                                                • Instruction ID: da5e3a6b8615f7fc9763e362b131f946d251b316bd2acc507b7b22157b73f9fc
                                                                                                • Opcode Fuzzy Hash: 90b816baf6681459c689896bd7ee7621983de5913a9f55156db5b466bfdb1e74
                                                                                                • Instruction Fuzzy Hash: 1BE03931941224BB9B200BA29D09EDB7F6DEF06BA1B010455B809A2111DAA18E54EAF4
                                                                                                APIs
                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041AB64
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: GlobalMemoryStatus
                                                                                                • String ID: @
                                                                                                • API String ID: 1890195054-2766056989
                                                                                                • Opcode ID: a4fe8e15525f2be1febd29730eb74c732a6063ed027868c332be47892e1af589
                                                                                                • Instruction ID: b665d68c061e3f9f56ba9c4249da2251c097319f67e9030db6e937b6cf7da2fa
                                                                                                • Opcode Fuzzy Hash: a4fe8e15525f2be1febd29730eb74c732a6063ed027868c332be47892e1af589
                                                                                                • Instruction Fuzzy Hash: 00D067B59013189FCB20DFA8E945A8DBBF8EB48214F004529E946E3744E774E945CB94
                                                                                                APIs
                                                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEventStartupsocket
                                                                                                • String ID:
                                                                                                • API String ID: 1953588214-0
                                                                                                • Opcode ID: 9dcc25316a99288ac387cf2e613c868b0e107fead0b532e7680f1acbcbd447ec
                                                                                                • Instruction ID: e62a462d4859cb901c95814de100b0ae44c334504336dc08fc7633b5118be932
                                                                                                • Opcode Fuzzy Hash: 9dcc25316a99288ac387cf2e613c868b0e107fead0b532e7680f1acbcbd447ec
                                                                                                • Instruction Fuzzy Hash: 100171B0508B809FD7358F38B8456977FE0AB15314F044DAEF1D697BA1C7B5A481CB18
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433FF2
                                                                                                  • Part of subcall function 00437DE7: RaiseException.KERNEL32(?,?,00434621,?,?,?,?,?,?,?,?,00434621,?,0046E654,0041AF80,?), ref: 00437E47
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0043400F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3476068407-0
                                                                                                • Opcode ID: 8f9b2f949f6b7ca7b98c1710385d9d858744d792f8e387416edbffdc20ead5bb
                                                                                                • Instruction ID: 1c2073f64fee591a786a8a3f9c67cac18272885bad9296719f7a79fda1cbf913
                                                                                                • Opcode Fuzzy Hash: 8f9b2f949f6b7ca7b98c1710385d9d858744d792f8e387416edbffdc20ead5bb
                                                                                                • Instruction Fuzzy Hash: 1BF0BB25C0430D768B04BEA6E80A9AD33BC5E08329F50513BB825914D1FB7C9759C5CD
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32 ref: 0041AE7F
                                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AE92
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$ForegroundText
                                                                                                • String ID:
                                                                                                • API String ID: 29597999-0
                                                                                                • Opcode ID: 27a61dc13c3baf2ab93a997f5cd2cb0d43e4b22d1e77ef92c0de48519faa66db
                                                                                                • Instruction ID: 7a6786a6daea7d79da8b38e9164549a295f8c3929764bf887eb2819544a3ffc0
                                                                                                • Opcode Fuzzy Hash: 27a61dc13c3baf2ab93a997f5cd2cb0d43e4b22d1e77ef92c0de48519faa66db
                                                                                                • Instruction Fuzzy Hash: 4AE04875A0031867FB20B7659C4EFD6766C9704B05F0400ADB619E21C3EDB4EA048BE4
                                                                                                APIs
                                                                                                • getaddrinfo.WS2_32(00000000,00000000,00000000,00472B28,004750FC,00000000,00414318,00000000,00000001), ref: 00414094
                                                                                                • WSASetLastError.WS2_32(00000000), ref: 00414099
                                                                                                  • Part of subcall function 00413F0F: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413F5E
                                                                                                  • Part of subcall function 00413F0F: LoadLibraryA.KERNEL32(?), ref: 00413FA0
                                                                                                  • Part of subcall function 00413F0F: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413FC0
                                                                                                  • Part of subcall function 00413F0F: FreeLibrary.KERNEL32(00000000), ref: 00413FC7
                                                                                                  • Part of subcall function 00413F0F: LoadLibraryA.KERNEL32(?), ref: 00413FFF
                                                                                                  • Part of subcall function 00413F0F: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414011
                                                                                                  • Part of subcall function 00413F0F: FreeLibrary.KERNEL32(00000000), ref: 00414018
                                                                                                  • Part of subcall function 00413F0F: GetProcAddress.KERNEL32(00000000,?), ref: 00414027
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                • String ID:
                                                                                                • API String ID: 1170566393-0
                                                                                                • Opcode ID: 82e440812e84df215c52e3f2a247b94cffd3b5d9bcffb41726cfdd66b840233f
                                                                                                • Instruction ID: e2cb8cd332084910a557c38b5932e5372e8318120e5bc29c0191cd414ba32ecd
                                                                                                • Opcode Fuzzy Hash: 82e440812e84df215c52e3f2a247b94cffd3b5d9bcffb41726cfdd66b840233f
                                                                                                • Instruction Fuzzy Hash: F4D012326406216B93506B6D5D01EBB5AEDDF96761B06003BF508D6111DA946C4142A8
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _wcslen
                                                                                                • String ID:
                                                                                                • API String ID: 176396367-0
                                                                                                • Opcode ID: 694b58b4804d0161d9866015f426625d870619d59cf6cfc82a5e2460fb3dabfc
                                                                                                • Instruction ID: 7b719d08391bbb12b01dd12fa1e9474f3c31e37c6e717f7fed2b29792a4b3228
                                                                                                • Opcode Fuzzy Hash: 694b58b4804d0161d9866015f426625d870619d59cf6cfc82a5e2460fb3dabfc
                                                                                                • Instruction Fuzzy Hash: B71193329002059BCB05FF66D8529EE77A4EF54319B10443FF842662E2EF78A915CB98
                                                                                                APIs
                                                                                                • VirtualProtect.KERNEL32(?,00410BDA,?,00000000,?,00000000,00000000,00410969), ref: 00410835
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 544645111-0
                                                                                                • Opcode ID: a7372f67efa92369d48c62df5f7f2955e1d45dc101a9cb84dd024311987fd690
                                                                                                • Instruction ID: a919ac539a4debb618ab194b449307f8042503fa1c6d266810504fc1f887d753
                                                                                                • Opcode Fuzzy Hash: a7372f67efa92369d48c62df5f7f2955e1d45dc101a9cb84dd024311987fd690
                                                                                                • Instruction Fuzzy Hash: 0C11C1727011019FD614DA18CC90BA7B766FF80710F59815AE125CB392DBB5FCD2CA94
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 0df71086ebe011a22fdff847967a9c5229befe104b2723ee1c4cd472e7f23894
                                                                                                • Instruction ID: 40638bbf90b8c7646580dfe44e72c34c865d7c07d7b9b06d8b79509a7ad90776
                                                                                                • Opcode Fuzzy Hash: 0df71086ebe011a22fdff847967a9c5229befe104b2723ee1c4cd472e7f23894
                                                                                                • Instruction Fuzzy Hash: 52E0E5B1B00220A6FB202A6A8C02B5B36498F437B4F070033AC0A9A291CE6CCC4081AF
                                                                                                APIs
                                                                                                • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Startup
                                                                                                • String ID:
                                                                                                • API String ID: 724789610-0
                                                                                                • Opcode ID: 512c305c5d81d862cf08042479f934390d4c65f7aad148c3c3ac63496dcf4775
                                                                                                • Instruction ID: a6df37c1a3c4b0bfee4e794801b63ea3b6ec8424062e123ecf3ffc10766d7ffb
                                                                                                • Opcode Fuzzy Hash: 512c305c5d81d862cf08042479f934390d4c65f7aad148c3c3ac63496dcf4775
                                                                                                • Instruction Fuzzy Hash: F7D012325586094ED620AAB5AD0F8A4775CD317611F0003BA6CB5825D3FA84561CC6AB
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Deallocate
                                                                                                • String ID:
                                                                                                • API String ID: 1075933841-0
                                                                                                • Opcode ID: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                • Instruction ID: a98dd8728e001a7547a03d6555be836c7c4d92c50a1b5b3c87ce8ff60de75990
                                                                                                • Opcode Fuzzy Hash: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                • Instruction Fuzzy Hash: 69A0123300C2016AC9852E00DD05C0ABFA1EB90360F20C41FF086140F0CB32A0B0A705
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNEL32(?,?,?,?,00410CD6,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00410BA6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: c6613924f6d0b7411c81be3707eeeac8e7e35806319a94a858a4c8f2f7b3dfbc
                                                                                                • Instruction ID: e51225b8dc451cf5f22672caa0f035088f4092e39e361f2bdb4b6f96ed7b397f
                                                                                                • Opcode Fuzzy Hash: c6613924f6d0b7411c81be3707eeeac8e7e35806319a94a858a4c8f2f7b3dfbc
                                                                                                • Instruction Fuzzy Hash: 12B00832419382EFCF02DF90DD0492ABAA2BB88712F094C5CB2A1501718B228428EB16
                                                                                                APIs
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                                  • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                                                                                  • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                                • CreatePipe.KERNEL32(00476D14,00476CFC,00476C20,00000000,0046656C,00000000), ref: 0040515E
                                                                                                • CreatePipe.KERNEL32(00476D00,00476D1C,00476C20,00000000), ref: 00405174
                                                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476C30,00476D04), ref: 004051E7
                                                                                                  • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                                                                                  • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                                                                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                  • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                                                                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,00466570,00000062,00466554), ref: 0040538E
                                                                                                • Sleep.KERNEL32(00000064,00000062,00466554), ref: 004053A8
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                • CloseHandle.KERNEL32 ref: 004053CD
                                                                                                • CloseHandle.KERNEL32 ref: 004053D5
                                                                                                • CloseHandle.KERNEL32 ref: 004053E7
                                                                                                • CloseHandle.KERNEL32 ref: 004053EF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                • String ID: lG$ mG$ mG$ mG$0lG$SystemDrive$cmd.exe$xlG$xlG$xlG$xlG$xlG
                                                                                                • API String ID: 3815868655-3731297122
                                                                                                • Opcode ID: 86f921471278ec483eba8a56cc2e2a59673921baa21f0650fc8bacb750bfe6bf
                                                                                                • Instruction ID: f3d75f47542da312923ddfb9c6ddab2c5323933c8a72fe1ed5abf95ef94fff6a
                                                                                                • Opcode Fuzzy Hash: 86f921471278ec483eba8a56cc2e2a59673921baa21f0650fc8bacb750bfe6bf
                                                                                                • Instruction Fuzzy Hash: 3491C571600605AFC610BB65ED42A6F3BAAEB84344F01443FF949A22E2DF7D9C448F6D
                                                                                                APIs
                                                                                                • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                                                • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                                  • Part of subcall function 0041B63A: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B694
                                                                                                  • Part of subcall function 0041B63A: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B6C6
                                                                                                  • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B717
                                                                                                  • Part of subcall function 0041B63A: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B76C
                                                                                                  • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B773
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                  • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00466454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                  • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                  • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                  • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(00000000,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                                                                                  • Part of subcall function 00404468: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                                • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                                  • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                                  • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00466AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                  • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                                • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                                  • Part of subcall function 0041BD82: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BE77
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                                • String ID: @PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$VNG$open$pPG$pPG$pPG$pPG$NG
                                                                                                • API String ID: 2918587301-3905578539
                                                                                                • Opcode ID: 2d4c9d9001a5d75cca5c8c8dff898c9b3bd56fb5bcd17d2ab6d4bcb8704d9e80
                                                                                                • Instruction ID: 1d2e2627ec10ef381271a766c0004beadc8049fa085ae304c46d09a1b017b010
                                                                                                • Opcode Fuzzy Hash: 2d4c9d9001a5d75cca5c8c8dff898c9b3bd56fb5bcd17d2ab6d4bcb8704d9e80
                                                                                                • Instruction Fuzzy Hash: 0F42A271A043005BC614FB76C8979AE76A59F90708F40493FF946771E2EE3CAA09C6DB
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 0041101D
                                                                                                  • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                  • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                  • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00411059
                                                                                                • CreateThread.KERNEL32(00000000,00000000,0041170F,00000000,00000000,00000000), ref: 004110BE
                                                                                                  • Part of subcall function 0041258F: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                                                                                  • Part of subcall function 0041258F: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                                                                                  • Part of subcall function 0041258F: RegCloseKey.KERNEL32(?), ref: 004125D8
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00411068
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00411332
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                                • String ID: 0TG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                • API String ID: 65172268-427618296
                                                                                                • Opcode ID: 7e96cfd3d354d5539c00ddf3362d0086846d961efb2d1c5bab9442529caad8a9
                                                                                                • Instruction ID: de889ccbd4d484bbc366ed6bf297281231fcf4352047712fae5372da0dd81bf3
                                                                                                • Opcode Fuzzy Hash: 7e96cfd3d354d5539c00ddf3362d0086846d961efb2d1c5bab9442529caad8a9
                                                                                                • Instruction Fuzzy Hash: 3D717E3160420157C214FB72CC579AE77A8AF94719F40053FF986A21E2EF7C9A49C6AF
                                                                                                APIs
                                                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$CloseFile$FirstNext
                                                                                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                • API String ID: 1164774033-3681987949
                                                                                                • Opcode ID: 7305b64f4a299713bc9d49fca14c6c4ac9f360f2d9b3be6faf8d52ce32a4eb2f
                                                                                                • Instruction ID: 4260ee55bd24f38cfaff6d718e7bb7aae0563b8f0cd35122f003610daf392ab1
                                                                                                • Opcode Fuzzy Hash: 7305b64f4a299713bc9d49fca14c6c4ac9f360f2d9b3be6faf8d52ce32a4eb2f
                                                                                                • Instruction Fuzzy Hash: 0A510B319042195ADB14F7A2DC96AEE7764EF50318F50017FF806B30E2EF789A45CA9D
                                                                                                APIs
                                                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$Close$File$FirstNext
                                                                                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                • API String ID: 3527384056-432212279
                                                                                                • Opcode ID: 5d15113ffda6c76e6360a38caf631b228a3f1044127a83d6d41a4bf75e8a57d9
                                                                                                • Instruction ID: 1e8de758c2b97f43aed4804fc6a56dd8ce4d3e4bc3adeefe5a602588f19c01c2
                                                                                                • Opcode Fuzzy Hash: 5d15113ffda6c76e6360a38caf631b228a3f1044127a83d6d41a4bf75e8a57d9
                                                                                                • Instruction Fuzzy Hash: F4412C319042196ACB14F7A5EC569EE7768EE11318F50017FF802B31E2EF399A458A9E
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 00415B5F
                                                                                                • EmptyClipboard.USER32 ref: 00415B6D
                                                                                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00415B8D
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415B96
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415BCC
                                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00415BD5
                                                                                                • CloseClipboard.USER32 ref: 00415BF2
                                                                                                • OpenClipboard.USER32 ref: 00415BF9
                                                                                                • GetClipboardData.USER32(0000000D), ref: 00415C09
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415C12
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415C1B
                                                                                                • CloseClipboard.USER32 ref: 00415C21
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                • String ID:
                                                                                                • API String ID: 3520204547-0
                                                                                                • Opcode ID: 488289ea9de8908cff031ad8a5077c1cc08477d40b7e6a0d66083b31ad9c2286
                                                                                                • Instruction ID: a6dc46a1ac747b1df6f49b20b287b9a63e2ec98da8de7deae82efe0a0170cbcd
                                                                                                • Opcode Fuzzy Hash: 488289ea9de8908cff031ad8a5077c1cc08477d40b7e6a0d66083b31ad9c2286
                                                                                                • Instruction Fuzzy Hash: A82137711047009BC714BBB1DC5AAAF7669AF94B06F00443FF907A61E2EF38C945C76A
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,004750FC), ref: 0040E30B
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,004750FC), ref: 0040E336
                                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E352
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E3D5
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,004750FC), ref: 0040E3E4
                                                                                                  • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                  • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                  • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,004750FC), ref: 0040E449
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                • API String ID: 726551946-1743721670
                                                                                                • Opcode ID: 9acd48a164968729904d245789d3b7e037ea123fc33478884c9135f12dfba46e
                                                                                                • Instruction ID: 57de327b15d82dbd2eac346b6cac6cdabb084366653080b34320caf9a24139d1
                                                                                                • Opcode Fuzzy Hash: 9acd48a164968729904d245789d3b7e037ea123fc33478884c9135f12dfba46e
                                                                                                • Instruction Fuzzy Hash: A17150311043419BC714FB62D8529AFB7A5AFD1358F400D3EF986631E2EF389919CA9A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0$1$2$3$4$5$6$7
                                                                                                • API String ID: 0-3177665633
                                                                                                • Opcode ID: 222a68796660df216f3d1928a0dbd2b7e232ace43aeba40d8268743ef49592b9
                                                                                                • Instruction ID: a206eb20bee8e87b23b85030021c48398d73e585fead2f4b7fd4ae1d02439eb2
                                                                                                • Opcode Fuzzy Hash: 222a68796660df216f3d1928a0dbd2b7e232ace43aeba40d8268743ef49592b9
                                                                                                • Instruction Fuzzy Hash: EA61D5B4108301AEDB00EF21C862FEA77E4AF95750F44485EF591672E2DF78AA48C797
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32(?,?,00475108), ref: 00409B3F
                                                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                • GetKeyboardState.USER32(?,?,00475108), ref: 00409B67
                                                                                                • ToUnicodeEx.USER32(0047515C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                • ToUnicodeEx.USER32(0047515C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                • String ID: `kG
                                                                                                • API String ID: 1888522110-3643241581
                                                                                                • Opcode ID: c97b305c4e5192c039be4b57959f7d148ad44e176559ca20096398a0f42faa8b
                                                                                                • Instruction ID: 5852d3e9e60d78bbc7fecef5f6baa999b7b2ba0a9f64a262714a670a3ee03c46
                                                                                                • Opcode Fuzzy Hash: c97b305c4e5192c039be4b57959f7d148ad44e176559ca20096398a0f42faa8b
                                                                                                • Instruction Fuzzy Hash: 3B318F72504308AFD700DF91DC45FDBB7ECEB88715F01083AB645D61A1DBB5E9488B9A
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 00406788
                                                                                                • CoGetObject.OLE32(?,00000024,004669B0,00000000), ref: 004067E9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Object_wcslen
                                                                                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                • API String ID: 240030777-3166923314
                                                                                                • Opcode ID: 37d5bffcbb8f4b2cbb961f9636bb3800fd08e5c8d40d037755d6192962cbe9cf
                                                                                                • Instruction ID: 6c9b37094527eb08cc4748ecdfbd23cbc672ad5faa28133fe458ce4522bc368c
                                                                                                • Opcode Fuzzy Hash: 37d5bffcbb8f4b2cbb961f9636bb3800fd08e5c8d40d037755d6192962cbe9cf
                                                                                                • Instruction Fuzzy Hash: B11133B29011186ADB10FAA58955A9E77BCDB48714F11047FF905F3281E77C9A0486BD
                                                                                                APIs
                                                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00475920), ref: 00419ACE
                                                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419B1D
                                                                                                • GetLastError.KERNEL32 ref: 00419B2B
                                                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 00419B63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                • String ID:
                                                                                                • API String ID: 3587775597-0
                                                                                                • Opcode ID: 4abb927b64a6e0c08a77427b2e9d4beecf9518360263125781bd1ea90e147e55
                                                                                                • Instruction ID: 410433f0f292194423399e5208e7b63ee2478b974df0930e3a7ace9da88798fe
                                                                                                • Opcode Fuzzy Hash: 4abb927b64a6e0c08a77427b2e9d4beecf9518360263125781bd1ea90e147e55
                                                                                                • Instruction Fuzzy Hash: C28142311043049BC314FB21DC95DAFB7A8BF94718F50492EF582621D2EF78EA09CB9A
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 004480CC
                                                                                                • _free.LIBCMT ref: 004480F0
                                                                                                • _free.LIBCMT ref: 00448277
                                                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045E478), ref: 00448289
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0047279C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448301
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727F0,000000FF,?,0000003F,00000000,?), ref: 0044832E
                                                                                                • _free.LIBCMT ref: 00448443
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                • String ID: xE
                                                                                                • API String ID: 314583886-407097786
                                                                                                • Opcode ID: 29f33701d0dde71fba102b35938b8b5784e7ceb7e6dd2606d32a2e84e67b5ec7
                                                                                                • Instruction ID: 53eab31d398634ed2913b9f897b2f59caf849b5b19a8cc02276c673e3ebcc531
                                                                                                • Opcode Fuzzy Hash: 29f33701d0dde71fba102b35938b8b5784e7ceb7e6dd2606d32a2e84e67b5ec7
                                                                                                • Instruction Fuzzy Hash: 24C14731904205ABFB249F698D81AAF7BB8EF41310F2441AFE88497351EF798E42C75C
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B694
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B6C6
                                                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004752F0,00475308), ref: 0041B734
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B741
                                                                                                  • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B717
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B76C
                                                                                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B773
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,004752F0,00475308), ref: 0041B77B
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B78E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                • String ID:
                                                                                                • API String ID: 2341273852-0
                                                                                                • Opcode ID: 29d361786a175de539fdf9d753c964fcdbe74632238a9f507c15aa3fc292f646
                                                                                                • Instruction ID: 009c1ade3c0c7cd9a9baeecb78710ce3116f293085b5e5d3e47bbce280e6f24a
                                                                                                • Opcode Fuzzy Hash: 29d361786a175de539fdf9d753c964fcdbe74632238a9f507c15aa3fc292f646
                                                                                                • Instruction Fuzzy Hash: 2931937180521CAACB20E7B19C89FDA777CAF55304F0404EBF515E2181EF799AC4CB69
                                                                                                APIs
                                                                                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 004130F2
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 004130FE
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004132C5
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004132CC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                • API String ID: 2127411465-314212984
                                                                                                • Opcode ID: 576aa220a4a680e1399580b3727aef47968bb71051d9a45b1f65329d62e60ed4
                                                                                                • Instruction ID: 0508f95716d3db9771c6b78d28bd3d55684df0f5bc265fe56362dad8d88080f3
                                                                                                • Opcode Fuzzy Hash: 576aa220a4a680e1399580b3727aef47968bb71051d9a45b1f65329d62e60ed4
                                                                                                • Instruction Fuzzy Hash: CEB1A371A043006BC614FA76CC979BE76695F9471CF40063FF846B31E2EE7C9A48869B
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(00000000,?), ref: 004190B5
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419181
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Find$CreateFirstNext
                                                                                                • String ID: PSG$NG$VG$VG
                                                                                                • API String ID: 341183262-216422830
                                                                                                • Opcode ID: c984fb6c1158bb0736a02d8f84e9760d8797dcf78c93f07d5c3e60c5617f76b9
                                                                                                • Instruction ID: 0b04574543ffaf1c42473f802d0f517b04b5d48d9dde9d4f65c428d20583ff9f
                                                                                                • Opcode Fuzzy Hash: c984fb6c1158bb0736a02d8f84e9760d8797dcf78c93f07d5c3e60c5617f76b9
                                                                                                • Instruction Fuzzy Hash: AF8150315042405AC314FB71C8A6EEF73A8AFD0718F50493FF946671E2EF389A49C69A
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004516D3
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 0045172E
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 0045173D
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,00443EFC,00000040,?,0044401C,00000055,00000000,?,?,00000055,00000000), ref: 00451785
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,00443F7C,00000040), ref: 004517A4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                • String ID: (E
                                                                                                • API String ID: 745075371-542121585
                                                                                                • Opcode ID: a84efe1a2cce186fb5bbf2749623e7c2965abdb2206941bc4280497163ca2dcb
                                                                                                • Instruction ID: 0c55cced660072bbdea70b00f38c40adf5ab32faa3293abc4b1f14fb3cf6f882
                                                                                                • Opcode Fuzzy Hash: a84efe1a2cce186fb5bbf2749623e7c2965abdb2206941bc4280497163ca2dcb
                                                                                                • Instruction Fuzzy Hash: EB5193719002059BDB10EFA5CC41BBF77B8AF04706F18056BFD11EB262DB789949CB69
                                                                                                APIs
                                                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                                • GetLastError.KERNEL32 ref: 0040B261
                                                                                                Strings
                                                                                                • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                                • UserProfile, xrefs: 0040B227
                                                                                                • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast
                                                                                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                • API String ID: 2018770650-1062637481
                                                                                                • Opcode ID: 7af3d97ac16f3e53cbcd40492f9c7a6f80e692b6ed517c42d6f54495a13373c1
                                                                                                • Instruction ID: af3d5975f8ef5736f4e1f689bc2271043fd855ebe8bb8600121af3fad6928989
                                                                                                • Opcode Fuzzy Hash: 7af3d97ac16f3e53cbcd40492f9c7a6f80e692b6ed517c42d6f54495a13373c1
                                                                                                • Instruction Fuzzy Hash: 5C01D63168010597CA0476B6DC6F8AF3B24E921708B10017FF802731E2FF3A9905C6DE
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416CAA
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00416CB1
                                                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416CC3
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416CE2
                                                                                                • GetLastError.KERNEL32 ref: 00416CE8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeShutdownPrivilege
                                                                                                • API String ID: 3534403312-3733053543
                                                                                                • Opcode ID: 594fceb9dcf720018193b7af68db4771e8a957862718425d2e1bf0ede3cec24e
                                                                                                • Instruction ID: cb90277d3e2bb8506008076be0b211c0c8a285b816e0fe18bd298ac82c07c5c8
                                                                                                • Opcode Fuzzy Hash: 594fceb9dcf720018193b7af68db4771e8a957862718425d2e1bf0ede3cec24e
                                                                                                • Instruction Fuzzy Hash: EEF0DA75901229BBDB109B91DC4DEEF7EBCEF05656F110065B805B20A2DE748A08CAA5
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004089AE
                                                                                                  • Part of subcall function 004041F1: socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 0040428C: connect.WS2_32(?,00C59578,00000010), ref: 004042A5
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(00000000,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                                                                                  • Part of subcall function 00404468: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                                                                                  • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                  • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                  • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                                • String ID:
                                                                                                • API String ID: 4043647387-0
                                                                                                • Opcode ID: 29ed660fe27b62b53502c8c0663a5e9b24079854c0ed8fa1f4872e183468e029
                                                                                                • Instruction ID: d6647de2ed81915fd1100427b9b1f0ab8477674b12134c2b00fdd843198b9521
                                                                                                • Opcode Fuzzy Hash: 29ed660fe27b62b53502c8c0663a5e9b24079854c0ed8fa1f4872e183468e029
                                                                                                • Instruction Fuzzy Hash: 0DA16E719001089BCB14EBA1DD92AEDB779AF54318F10427FF506B71D2EF385E498B98
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,00419A10,00000000,00000000), ref: 00419DC3
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00419A10,00000000,00000000), ref: 00419DD8
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419DE5
                                                                                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00419A10,00000000,00000000), ref: 00419DF0
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419E02
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419E05
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                • String ID:
                                                                                                • API String ID: 276877138-0
                                                                                                • Opcode ID: af999b41650d3cd8b8f8fe088188ad5770f3288987236d92c8a0026e65871fc6
                                                                                                • Instruction ID: bfab90d9ddd5c2d56401b7e15998ac1c6a079cb4321381bf248b2ffa9e014974
                                                                                                • Opcode Fuzzy Hash: af999b41650d3cd8b8f8fe088188ad5770f3288987236d92c8a0026e65871fc6
                                                                                                • Instruction Fuzzy Hash: 60F0E9715403146FD2115B31EC88DBF2A6CDF85BB2B01002EF442A3191CF78CD4995B5
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443F03,?,?,?,?,?,?,00000004), ref: 00450D71
                                                                                                • _wcschr.LIBVCRUNTIME ref: 00450E01
                                                                                                • _wcschr.LIBVCRUNTIME ref: 00450E0F
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443F03,00000000,00444023), ref: 00450EB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                • String ID: (E
                                                                                                • API String ID: 4212172061-542121585
                                                                                                • Opcode ID: 59e7985f3c02f7c10489d8edf0480172058bbcb387fbadea5ac0dcfc1ce8ddaa
                                                                                                • Instruction ID: 16e6850baad922d2e300dda2121b2fdf61a8ef58a3873fa5b3432b878cecddba
                                                                                                • Opcode Fuzzy Hash: 59e7985f3c02f7c10489d8edf0480172058bbcb387fbadea5ac0dcfc1ce8ddaa
                                                                                                • Instruction Fuzzy Hash: A361FC7A500306AAD725AB75CC42ABB73A8EF44316F14082FFD05D7243EB78E949C769
                                                                                                APIs
                                                                                                  • Part of subcall function 00416C9D: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416CAA
                                                                                                  • Part of subcall function 00416C9D: OpenProcessToken.ADVAPI32(00000000), ref: 00416CB1
                                                                                                  • Part of subcall function 00416C9D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416CC3
                                                                                                  • Part of subcall function 00416C9D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416CE2
                                                                                                  • Part of subcall function 00416C9D: GetLastError.KERNEL32 ref: 00416CE8
                                                                                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00415AF3
                                                                                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415B08
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00415B0F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                • String ID: PowrProf.dll$SetSuspendState
                                                                                                • API String ID: 1589313981-1420736420
                                                                                                • Opcode ID: 2d001ba894be1cb2130f6628d1277eb64d1aab07dbc9b4c0122e7829c84359c3
                                                                                                • Instruction ID: be3657bdb4b9c596b700244bf1edaf45c421fe256a6f88bebcc25452880e9c8a
                                                                                                • Opcode Fuzzy Hash: 2d001ba894be1cb2130f6628d1277eb64d1aab07dbc9b4c0122e7829c84359c3
                                                                                                • Instruction Fuzzy Hash: 84215E71644741A6CB14FBB198A6AFF22599F80748F40483FB442771D2EF7CE889865E
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451712,?,00000000), ref: 0045148C
                                                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451712,?,00000000), ref: 004514B5
                                                                                                • GetACP.KERNEL32(?,?,00451712,?,00000000), ref: 004514CA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: 7de529321666405c3dbd177549b20e94864b34fdb637d578d31b634f87125a95
                                                                                                • Instruction ID: 27270ea0035267e4249f05f4639a08e7e92d7e6a6a5113c6df6fa5280cb26525
                                                                                                • Opcode Fuzzy Hash: 7de529321666405c3dbd177549b20e94864b34fdb637d578d31b634f87125a95
                                                                                                • Instruction Fuzzy Hash: 0821C731600100B7DB308F54C901FA773A6AF52B67F5A9566EC0AD7223EB3ADD49C399
                                                                                                APIs
                                                                                                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A85B
                                                                                                • LoadResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A86F
                                                                                                • LockResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A876
                                                                                                • SizeofResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A885
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                                • String ID: SETTINGS
                                                                                                • API String ID: 3473537107-594951305
                                                                                                • Opcode ID: af91fd7a50235684c3f0857021386823e2c7131a01440ecb0520647964aa65c6
                                                                                                • Instruction ID: 1fe06f9b0c9a023904624b9b61caa7bd4c13f92b8b5c35c0d543cfa28092256f
                                                                                                • Opcode Fuzzy Hash: af91fd7a50235684c3f0857021386823e2c7131a01440ecb0520647964aa65c6
                                                                                                • Instruction Fuzzy Hash: DAE01A76240720ABCB211BA1BD4CD073E39F7867637000039F549A2221CE75CC52CB29
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00407A91
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,00466AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$File$CloseFirstH_prologNext
                                                                                                • String ID:
                                                                                                • API String ID: 1157919129-0
                                                                                                • Opcode ID: a9ade532a69c0c03a770b92a0927671e6850a93d67f27f31570d02551750502b
                                                                                                • Instruction ID: e1cc7e471fba1e38487cd482a49156f4879f85d64aa43a49cb1f79655cfb0c65
                                                                                                • Opcode Fuzzy Hash: a9ade532a69c0c03a770b92a0927671e6850a93d67f27f31570d02551750502b
                                                                                                • Instruction Fuzzy Hash: 325162729001085ACB14FBA5DD969ED7B78AF50318F50417FB806B31D2EF3CAB498B99
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DownloadExecuteFileShell
                                                                                                • String ID: C:\Users\user\Desktop\plugmancrypted.exe$open
                                                                                                • API String ID: 2825088817-1599620174
                                                                                                • Opcode ID: 501111326ee1c2a1b572341bf5a5e250aeb96804c383ed8500ebec7f8d882be9
                                                                                                • Instruction ID: e32f65eb076a11421f0b28df520d432f118a03887cfea0ef8c7e4d0a3f62d172
                                                                                                • Opcode Fuzzy Hash: 501111326ee1c2a1b572341bf5a5e250aeb96804c383ed8500ebec7f8d882be9
                                                                                                • Instruction Fuzzy Hash: E361CF3160430067CA14FA76D8569BE37A59F81718F01493FBC46772E6EF3CAA05C69B
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstNextsend
                                                                                                • String ID: pPG$pPG
                                                                                                • API String ID: 4113138495-3204143781
                                                                                                • Opcode ID: 9c86ae9083aba95fe6e1a216e3c38f7b0811728edcba592c93e5463d622be567
                                                                                                • Instruction ID: b94dab712156e78be0f8cc3bef15d45c6a114b58aade1ae888b20ae253cfdc5a
                                                                                                • Opcode Fuzzy Hash: 9c86ae9083aba95fe6e1a216e3c38f7b0811728edcba592c93e5463d622be567
                                                                                                • Instruction Fuzzy Hash: F42187715043015BC714FB61DC95DEF77A8AF90318F40093EF996A31E1EF38AA08CA9A
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BE77
                                                                                                  • Part of subcall function 004127AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004127B9
                                                                                                  • Part of subcall function 004127AA: RegSetValueExA.KERNEL32(?,XwF,00000000,?,00000000,00000000,00475308,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127E1
                                                                                                  • Part of subcall function 004127AA: RegCloseKey.KERNEL32(?,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                • API String ID: 4127273184-3576401099
                                                                                                • Opcode ID: 66458e8cc3153e1574d54a22ceeec595ae1d5fb91ba42e72fdc85762ed94257a
                                                                                                • Instruction ID: 3b74369dcb7a8544f1b55df16a592c3d868ba554001bd6a4c71ed5c97b6fc17b
                                                                                                • Opcode Fuzzy Hash: 66458e8cc3153e1574d54a22ceeec595ae1d5fb91ba42e72fdc85762ed94257a
                                                                                                • Instruction Fuzzy Hash: F5112132B8035033D518313A5E67BBF2816D34AB60F55415FB6066A6CAFADE4AA103DF
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 3906539128-746054323
                                                                                                • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstH_prologNext
                                                                                                • String ID:
                                                                                                • API String ID: 301083792-0
                                                                                                • Opcode ID: e965a500a65fc7c58e3cf6ed6430ac57f20e30f5777b54b83fb1e9de5cc82ea8
                                                                                                • Instruction ID: 402ed7a5658d2f2a6adb961a0daa6f616ba37c5e7974c2bf040f6c8ce137202a
                                                                                                • Opcode Fuzzy Hash: e965a500a65fc7c58e3cf6ed6430ac57f20e30f5777b54b83fb1e9de5cc82ea8
                                                                                                • Instruction Fuzzy Hash: 127141728001199BCB15EBA1DC919EE7778AF54314F10427FE846B71E2EF385E49CB98
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: .$|/Hn/
                                                                                                • API String ID: 0-1954991921
                                                                                                • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004510CE
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045111F
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004511DF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                • String ID:
                                                                                                • API String ID: 2829624132-0
                                                                                                • Opcode ID: dd837d4aabf90151236531eaa8a7eeaa8db7e820d6096a7a5c305d7033fab590
                                                                                                • Instruction ID: aee342ac21436657f5846041838c3bd09d84a4d920a4c2a145562aed062da8a9
                                                                                                • Opcode Fuzzy Hash: dd837d4aabf90151236531eaa8a7eeaa8db7e820d6096a7a5c305d7033fab590
                                                                                                • Instruction Fuzzy Hash: F661D8719005079BDB289F25CC82B7677A8EF04306F1041BBFD05D66A2EB78D949DB58
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A965
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A96F
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A97C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: af6e046c0509c32b3386d0bc76265e00dd1467fe013a3816057f721e951f2d82
                                                                                                • Instruction ID: 2e36d9e0b5662236be867d7d52d6a22dc3a0b47d07fc7de068387a758ceea7c7
                                                                                                • Opcode Fuzzy Hash: af6e046c0509c32b3386d0bc76265e00dd1467fe013a3816057f721e951f2d82
                                                                                                • Instruction Fuzzy Hash: E731D6B491131CABCB21DF24D98978DB7B8BF08311F5051EAE80CA7251EB749F818F49
                                                                                                APIs
                                                                                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004328CD,00000024,?,?,?), ref: 00432B57
                                                                                                • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CDC9,?), ref: 00432B6D
                                                                                                • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CDC9,?), ref: 00432B7F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                • String ID:
                                                                                                • API String ID: 1815803762-0
                                                                                                • Opcode ID: 35a60dd61fd8b237ab80bed8c3b3b6d5f5cecafcaafe6d2ae27acd69f3d7963f
                                                                                                • Instruction ID: 69441ad90531868046e0b1178e1924530c202fcb63ed7aa5228c64bcbe668f15
                                                                                                • Opcode Fuzzy Hash: 35a60dd61fd8b237ab80bed8c3b3b6d5f5cecafcaafe6d2ae27acd69f3d7963f
                                                                                                • Instruction Fuzzy Hash: ADE09231608350FFFB300F25AC08F177B94EB89B65F21063AF155E40E4CAA59805961C
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 00442785
                                                                                                • TerminateProcess.KERNEL32(00000000,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 0044278C
                                                                                                • ExitProcess.KERNEL32 ref: 0044279E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 580307e7f9ed19ccdf9c10412063d8ea8bc62da0884c48fe7532ae208af4f440
                                                                                                • Instruction ID: c8bd48e99420b6c7b8697c64d03bd4ba31791432aa3bec6fd876c0c539ce8582
                                                                                                • Opcode Fuzzy Hash: 580307e7f9ed19ccdf9c10412063d8ea8bc62da0884c48fe7532ae208af4f440
                                                                                                • Instruction Fuzzy Hash: 7EE04F31000704AFEF016F10DD099493F29EF50396F448469F90896132CF79DC42CA48
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041525B,00000000), ref: 0041AED7
                                                                                                • NtSuspendProcess.NTDLL(00000000), ref: 0041AEE4
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,0041525B,00000000), ref: 0041AEED
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseHandleOpenSuspend
                                                                                                • String ID:
                                                                                                • API String ID: 1999457699-0
                                                                                                • Opcode ID: 3b5e723eaf058cf4912863f44fffedc3e3ae8a4bfc071aeb07fd662f2e304fa3
                                                                                                • Instruction ID: cbdad53ed629db76d40e0897fbdb217e77766e02faa6d5bf56048ccc5fb15ac5
                                                                                                • Opcode Fuzzy Hash: 3b5e723eaf058cf4912863f44fffedc3e3ae8a4bfc071aeb07fd662f2e304fa3
                                                                                                • Instruction Fuzzy Hash: 80D05E32500222638220176A7C0D997EE68DBC1AB2702416AF404D22219E30C88186A9
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415280,00000000), ref: 0041AF03
                                                                                                • NtResumeProcess.NTDLL(00000000), ref: 0041AF10
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00415280,00000000), ref: 0041AF19
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseHandleOpenResume
                                                                                                • String ID:
                                                                                                • API String ID: 3614150671-0
                                                                                                • Opcode ID: 6d31317880465a65d63f867429a7c123c2a1788788c54349cbb6221ea43f3537
                                                                                                • Instruction ID: 5834692e6dbfc7302e0627ffd9745f57241b902771746b5adb28784224297b78
                                                                                                • Opcode Fuzzy Hash: 6d31317880465a65d63f867429a7c123c2a1788788c54349cbb6221ea43f3537
                                                                                                • Instruction Fuzzy Hash: 7CD05E32504121638220176A6C0D997ED68DBC5AB3702422AF504D22219E30C881C6A8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: .
                                                                                                • API String ID: 0-248832578
                                                                                                • Opcode ID: 90d0b4729825bd90b6a9b0e481f721cabe6d10aefd9ef70f2d231800c5ca14c4
                                                                                                • Instruction ID: eafca5d3f29716c6c78e4e4ea3ad02361a474eaab44c7f235df41bcab4a95e78
                                                                                                • Opcode Fuzzy Hash: 90d0b4729825bd90b6a9b0e481f721cabe6d10aefd9ef70f2d231800c5ca14c4
                                                                                                • Instruction Fuzzy Hash: 3431F472D00249ABEB249E79CC85EFB7BBDDB85314F0401AEF419D7251E6349E418B54
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004477FA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: GetLocaleInfoEx
                                                                                                • API String ID: 2299586839-2904428671
                                                                                                • Opcode ID: 6bd799bfac9af36fd133eb5d72b5b36b41e76e7aabeb18fd4f2c376b7933ddb9
                                                                                                • Instruction ID: 58a0a1dc03b065be57d87c6409a63545e464c60cfee5b8c381720ea1698dad41
                                                                                                • Opcode Fuzzy Hash: 6bd799bfac9af36fd133eb5d72b5b36b41e76e7aabeb18fd4f2c376b7933ddb9
                                                                                                • Instruction Fuzzy Hash: A0F0F631640318B7DB056F61CC06F6E7B64DB04712F10019AFC0467252CF75AB119A9D
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045131E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                • String ID:
                                                                                                • API String ID: 1663032902-0
                                                                                                • Opcode ID: bc85fdc09d4fce3dfbe50538f39d64f32c4b6099e2a05669c9b1daebb1f6e385
                                                                                                • Instruction ID: 0b21b5069fbf1db5bec531630a8d3eee6f1f474d64bb54c6a1c44a3d8e2cc721
                                                                                                • Opcode Fuzzy Hash: bc85fdc09d4fce3dfbe50538f39d64f32c4b6099e2a05669c9b1daebb1f6e385
                                                                                                • Instruction Fuzzy Hash: 2221D372501206ABEB24AB25CC61B7B77ACEB04316F10017BFD01D6663EB78AD49CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • EnumSystemLocalesW.KERNEL32(0045107A,00000001,00000000,?,00443EFC,?,004516A7,00000000,?,?,?), ref: 00450FC4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 1084509184-0
                                                                                                • Opcode ID: 2806d9e87b91580947c38d8a0617f63d2b95e775220bf3e675df36a013b02c7b
                                                                                                • Instruction ID: 451a354658792f2252a151bea30e2a99c0585190810680eeac5085bd3c0c80bb
                                                                                                • Opcode Fuzzy Hash: 2806d9e87b91580947c38d8a0617f63d2b95e775220bf3e675df36a013b02c7b
                                                                                                • Instruction Fuzzy Hash: FD11293B2007019FDB28AF39C8916BABB92FF8435AB14442DE94747B41D7B9B847C744
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451298,00000000,00000000,?), ref: 00451526
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 2692324296-0
                                                                                                • Opcode ID: e61a00dc03fcb481ae1f4eaad0348555d58099959c5ffac150b0217cf8aecc77
                                                                                                • Instruction ID: d2fe2c3fce417e68b0623dfb5eb434355baf81d8c10f12b7a8aa08190ad777f0
                                                                                                • Opcode Fuzzy Hash: e61a00dc03fcb481ae1f4eaad0348555d58099959c5ffac150b0217cf8aecc77
                                                                                                • Instruction Fuzzy Hash: 4AF0F9326102197BDB289A258C46BBB7758EB80755F04046AEC07A3251FA78FD45C6D4
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • EnumSystemLocalesW.KERNEL32(004512CA,00000001,?,?,00443EFC,?,0045166B,00443EFC,?,?,?,?,?,00443EFC,?,?), ref: 00451039
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 1084509184-0
                                                                                                • Opcode ID: 1383e35cddf71846be5f04bfb451628eb58ff654fdb94fb85b79533aadb6d968
                                                                                                • Instruction ID: 969c50ee721750b2a7664082bdad3607fc28c6e2ba06475257799e5d9796a5a7
                                                                                                • Opcode Fuzzy Hash: 1383e35cddf71846be5f04bfb451628eb58ff654fdb94fb85b79533aadb6d968
                                                                                                • Instruction Fuzzy Hash: 19F028363003045FDB245F76DC81B7B7B95EF8075DF04442EFD4187A92D6B99C828604
                                                                                                APIs
                                                                                                  • Part of subcall function 00444CDC: EnterCriticalSection.KERNEL32(-00472558,?,0044246B,00000000,0046EAD0,0000000C,00442426,0000000A,?,?,00448949,0000000A,?,00447184,00000001,00000364), ref: 00444CEB
                                                                                                • EnumSystemLocalesW.KERNEL32(00447278,00000001,0046EC58,0000000C), ref: 004472F6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1272433827-0
                                                                                                • Opcode ID: ce5d864c7127ce76761e0cbea026e968eb5e88cd2d94c9e55423b39c5525c7e8
                                                                                                • Instruction ID: acebf021cc54f47487df9b00313a15cc1bfd22b3d47c3c45ccbcf72c34342655
                                                                                                • Opcode Fuzzy Hash: ce5d864c7127ce76761e0cbea026e968eb5e88cd2d94c9e55423b39c5525c7e8
                                                                                                • Instruction Fuzzy Hash: 97F06236620200DFEB10EF79DE46B5D37E0EB44715F10816AF414DB2A1CBB89981DB4D
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • EnumSystemLocalesW.KERNEL32(00450E5E,00000001,?,?,?,004516C9,00443EFC,?,?,?,?,?,00443EFC,?,?,?), ref: 00450F3E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 1084509184-0
                                                                                                • Opcode ID: c0752d91e59c0ec8caa35cedbb84099f1f2f8e555a7fabae98b3644acfac0ab5
                                                                                                • Instruction ID: 7585e2e2e927d60b614fbbb7cbec4ece609ea7599c31e6a5607aeddcbc8761df
                                                                                                • Opcode Fuzzy Hash: c0752d91e59c0ec8caa35cedbb84099f1f2f8e555a7fabae98b3644acfac0ab5
                                                                                                • Instruction Fuzzy Hash: 89F0E53A30020557CB28AF35D845B6A7F94EFC1715B16449EFE098B252C67AD886C794
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00033EEE,00433BBC), ref: 00433EE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: e588410f7d772084ad9b5e6a201b2d06307ba3208cc6e1757a1b1bd45e9a1e30
                                                                                                • Instruction ID: 9bcc487b38fe881941be7e97ad5738302595bcb4dafebc2e14986f4c0a09dd7d
                                                                                                • Opcode Fuzzy Hash: e588410f7d772084ad9b5e6a201b2d06307ba3208cc6e1757a1b1bd45e9a1e30
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004181AF
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 004181BA
                                                                                                  • Part of subcall function 00418648: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418678
                                                                                                • CreateCompatibleBitmap.GDI32(?,00000000), ref: 0041823B
                                                                                                • DeleteDC.GDI32(?), ref: 00418253
                                                                                                • DeleteDC.GDI32(00000000), ref: 00418256
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00418261
                                                                                                • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418289
                                                                                                • GetCursorInfo.USER32(?), ref: 004182AB
                                                                                                • GetIconInfo.USER32(?,?), ref: 004182C1
                                                                                                • DeleteObject.GDI32(?), ref: 004182F0
                                                                                                • DeleteObject.GDI32(?), ref: 004182FD
                                                                                                • DrawIcon.USER32(00000000,?,?,?), ref: 0041830A
                                                                                                • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00660046), ref: 0041833A
                                                                                                • GetObjectA.GDI32(?,00000018,?), ref: 00418369
                                                                                                • LocalAlloc.KERNEL32(00000040,00000028), ref: 004183B2
                                                                                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 004183D5
                                                                                                • GlobalAlloc.KERNEL32(00000000,?), ref: 0041843E
                                                                                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00418461
                                                                                                • DeleteDC.GDI32(?), ref: 00418475
                                                                                                • DeleteDC.GDI32(00000000), ref: 00418478
                                                                                                • DeleteObject.GDI32(00000000), ref: 0041847B
                                                                                                • GlobalFree.KERNEL32(00CC0020), ref: 00418486
                                                                                                • DeleteObject.GDI32(00000000), ref: 0041853A
                                                                                                • GlobalFree.KERNEL32(?), ref: 00418541
                                                                                                • DeleteDC.GDI32(?), ref: 00418551
                                                                                                • DeleteDC.GDI32(00000000), ref: 0041855C
                                                                                                • DeleteDC.GDI32(?), ref: 0041858E
                                                                                                • DeleteDC.GDI32(00000000), ref: 00418591
                                                                                                • DeleteObject.GDI32(?), ref: 00418597
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                                                                                • String ID: DISPLAY
                                                                                                • API String ID: 1352755160-865373369
                                                                                                • Opcode ID: 0505d035874fc570a8704638f46c019b9ebd9cf2a992f5a5719297bbb1a773d2
                                                                                                • Instruction ID: a1654617e6feb41a21483335bab58d6c80918fdf06c9fa75f2eb3c48c5790805
                                                                                                • Opcode Fuzzy Hash: 0505d035874fc570a8704638f46c019b9ebd9cf2a992f5a5719297bbb1a773d2
                                                                                                • Instruction Fuzzy Hash: EFC16C31504344AFD7209F21CC44BABBBE9EF88751F44482EF989A32A1DF34E945CB5A
                                                                                                APIs
                                                                                                  • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                  • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                                                                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                                                                                  • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                                                                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                  • Part of subcall function 0041B79A: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C632
                                                                                                • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                • String ID: SG$ SG$ SG$""", 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$PSG$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                • API String ID: 1861856835-1415323999
                                                                                                • Opcode ID: 654f7889ed5edaac55a18f8be21b9837d0d7268fd1f2b157d317ae4c17904d16
                                                                                                • Instruction ID: 61d23169d088639e971774d7266815e56d2523c1fe05d3951d40341dc357c42d
                                                                                                • Opcode Fuzzy Hash: 654f7889ed5edaac55a18f8be21b9837d0d7268fd1f2b157d317ae4c17904d16
                                                                                                • Instruction Fuzzy Hash: F891A3316042005AC314FB21D852AAF7799AF90318F50453FF88AB71E2EF7CAD49C69E
                                                                                                APIs
                                                                                                  • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                  • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C013
                                                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C056
                                                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C065
                                                                                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                                                                                  • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                                                                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                  • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C280
                                                                                                • ExitProcess.KERNEL32 ref: 0040C287
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                • String ID: SG$ SG$")$.vbs$On Error Resume Next$PSG$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                                • API String ID: 3797177996-899740633
                                                                                                • Opcode ID: fe5a45b969f6b52b6f2cf3025fdf4d474cec8af89c06338ae5a7bcf8e81d1fb7
                                                                                                • Instruction ID: 3970d62be7f9f5e1fdb580af11360c5c0218cddba346a3e39168d22276c4a34b
                                                                                                • Opcode Fuzzy Hash: fe5a45b969f6b52b6f2cf3025fdf4d474cec8af89c06338ae5a7bcf8e81d1fb7
                                                                                                • Instruction Fuzzy Hash: 838194316042005BC315FB21D852AAF7799AF91708F10453FF986A72E2EF7C9D49C69E
                                                                                                APIs
                                                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00475308,?,00000000), ref: 004113AC
                                                                                                • ExitProcess.KERNEL32 ref: 004115F5
                                                                                                  • Part of subcall function 00412735: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                                                                                  • Part of subcall function 00412735: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                                                                                  • Part of subcall function 00412735: RegCloseKey.KERNEL32(00000000), ref: 00412775
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 00411433
                                                                                                • OpenProcess.KERNEL32(00100000,00000000,,@,?,?,?,?,00000000), ref: 00411442
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 0041144D
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411454
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 0041145A
                                                                                                  • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                  • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                  • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 0041148B
                                                                                                • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 004114E7
                                                                                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411501
                                                                                                • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 00411513
                                                                                                  • Part of subcall function 0041B79A: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B7F6
                                                                                                  • Part of subcall function 0041B79A: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B80A
                                                                                                  • Part of subcall function 0041B79A: CloseHandle.KERNEL32(00000000), ref: 0041B817
                                                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041155B
                                                                                                • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 0041159C
                                                                                                • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004115B1
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004115BC
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004115C3
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004115C9
                                                                                                  • Part of subcall function 0041B79A: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                                • String ID: ,@$.exe$0TG$PSG$WDH$exepath$open$temp_
                                                                                                • API String ID: 4250697656-4136069298
                                                                                                • Opcode ID: 57a76233155c5e6f3f5eb151cd316bca093877b01aee461a5fef8088efcefce1
                                                                                                • Instruction ID: 17001e37a1d7cf9a3413e78a7a022695eb621cd558d1591dce66fb7483b9d66c
                                                                                                • Opcode Fuzzy Hash: 57a76233155c5e6f3f5eb151cd316bca093877b01aee461a5fef8088efcefce1
                                                                                                • Instruction Fuzzy Hash: 7551B571A00315BBDB00A7A09C46EFE736E9B44715F10416BF906B71E2EF788E858A9D
                                                                                                APIs
                                                                                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A4A8
                                                                                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A4BC
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00466554), ref: 0041A4E4
                                                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041A4F5
                                                                                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A536
                                                                                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A54E
                                                                                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A563
                                                                                                • SetEvent.KERNEL32 ref: 0041A580
                                                                                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A591
                                                                                                • CloseHandle.KERNEL32 ref: 0041A5A1
                                                                                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A5C3
                                                                                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A5CD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                • API String ID: 738084811-2094122233
                                                                                                • Opcode ID: 9c406ef75d85aaf9205e5cdb239cb86491b07f9d6e3c40e1a5da19045ddaa9b0
                                                                                                • Instruction ID: 23b594f260307180257043fa1e2d6aa1707bafa700398656917524c484c431be
                                                                                                • Opcode Fuzzy Hash: 9c406ef75d85aaf9205e5cdb239cb86491b07f9d6e3c40e1a5da19045ddaa9b0
                                                                                                • Instruction Fuzzy Hash: A251B1716442046AD214BB32EC92EBF3B9DAB90758F10443FF445621E2EE789D48866F
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 0040BC75
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750FC,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\plugmancrypted.exe,00000000,00000000,00000000,00000000,00000000,?,004750FC,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                                • _wcslen.LIBCMT ref: 0040BD54
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\plugmancrypted.exe,00000000,00000000), ref: 0040BDF2
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                                • _wcslen.LIBCMT ref: 0040BE34
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750FC,0000000E), ref: 0040BE9B
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000001), ref: 0040BEB9
                                                                                                • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                • String ID: SG$ SG$ SG$ SG$ SG$6$C:\Users\user\Desktop\plugmancrypted.exe$del$open
                                                                                                • API String ID: 1579085052-1018915927
                                                                                                • Opcode ID: b517d9bc3aa972765ce7c801ca7dc33223a078214a9d1acbeda1fcbeea04b810
                                                                                                • Instruction ID: cada26950b0f91ffbe9684419e497f708478a0192fdd3dd39558b78de3226dfb
                                                                                                • Opcode Fuzzy Hash: b517d9bc3aa972765ce7c801ca7dc33223a078214a9d1acbeda1fcbeea04b810
                                                                                                • Instruction Fuzzy Hash: 0B51C1316046006BD609B722EC52E7F77889F81719F50443FF985A62E2DF7CAD4582EE
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                                • WriteFile.KERNEL32(00000000,00472B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                                • WriteFile.KERNEL32(00000000,00472B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                                • WriteFile.KERNEL32(00000000,00472B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Write$Create
                                                                                                • String ID: RIFF$WAVE$data$fmt
                                                                                                • API String ID: 1602526932-4212202414
                                                                                                • Opcode ID: d86e0a11b62900f44300c56c570c8f4c6d29e182ebfed168058ac3948617b838
                                                                                                • Instruction ID: 459023fa40bd80d73c97eac26e4027242e7445eca248bff5dcea5bec94493f3f
                                                                                                • Opcode Fuzzy Hash: d86e0a11b62900f44300c56c570c8f4c6d29e182ebfed168058ac3948617b838
                                                                                                • Instruction Fuzzy Hash: 85411C726443187AE210DE51DD86FBB7FACEB85B54F40081AF644E6080D7A5E909DBB3
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\plugmancrypted.exe,00000001,004068B2,C:\Users\user\Desktop\plugmancrypted.exe,00000003,004068DA,004752F0,00406933), ref: 004064F4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProc
                                                                                                • String ID: C:\Users\user\Desktop\plugmancrypted.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                • API String ID: 1646373207-1248114784
                                                                                                • Opcode ID: ef23c6471a2b46cbb5b12a679159521cca5d22753a6c35f36816646c352fbe50
                                                                                                • Instruction ID: d8392adca69ca7380431791802c09c3f057f20abbaf47be00649cb9a46baa942
                                                                                                • Opcode Fuzzy Hash: ef23c6471a2b46cbb5b12a679159521cca5d22753a6c35f36816646c352fbe50
                                                                                                • Instruction Fuzzy Hash: D20171A4E40B1635CB206F7B7C94D17AEAC9E503503160837A406F32A1EEBCD400CD7D
                                                                                                APIs
                                                                                                  • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                  • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                  • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                • _strlen.LIBCMT ref: 10001855
                                                                                                • _strlen.LIBCMT ref: 10001869
                                                                                                • _strlen.LIBCMT ref: 1000188B
                                                                                                • _strlen.LIBCMT ref: 100018AE
                                                                                                • _strlen.LIBCMT ref: 100018C8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen$File$CopyCreateDelete
                                                                                                • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                • API String ID: 3296212668-3023110444
                                                                                                • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?), ref: 0041B3E1
                                                                                                • _memcmp.LIBVCRUNTIME ref: 0041B3F9
                                                                                                • lstrlenW.KERNEL32(?), ref: 0041B412
                                                                                                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B44D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B460
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B4A4
                                                                                                • lstrcmpW.KERNEL32(?,?), ref: 0041B4BF
                                                                                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B4D7
                                                                                                • _wcslen.LIBCMT ref: 0041B4E6
                                                                                                • FindVolumeClose.KERNEL32(?), ref: 0041B506
                                                                                                • GetLastError.KERNEL32 ref: 0041B51E
                                                                                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B54B
                                                                                                • lstrcatW.KERNEL32(?,?), ref: 0041B564
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 0041B573
                                                                                                • GetLastError.KERNEL32 ref: 0041B57B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                • String ID: ?
                                                                                                • API String ID: 3941738427-1684325040
                                                                                                • Opcode ID: ab6c0a2e820866b083e3708fbad612f297667e297ed8968616fd37775c99846c
                                                                                                • Instruction ID: f0577cbf519c1fbc76aa3138d797bbd7c283cc622b072e5c2a83b2d98bec9820
                                                                                                • Opcode Fuzzy Hash: ab6c0a2e820866b083e3708fbad612f297667e297ed8968616fd37775c99846c
                                                                                                • Instruction Fuzzy Hash: 8441A071504705ABC720DF61E8489EBB7E8EB48705F00482FF541D2262EF78D989CBDA
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                • API String ID: 4218353326-230879103
                                                                                                • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                • String ID:
                                                                                                • API String ID: 3899193279-0
                                                                                                • Opcode ID: 0e1a8f8bbfaf70a5321281e28d07a2b80f4a7f922fdb1718459ded84c8fb4435
                                                                                                • Instruction ID: a8aac0df7486383d9a181904d39d16e24afc3d72eb934652fe50c6e09291e228
                                                                                                • Opcode Fuzzy Hash: 0e1a8f8bbfaf70a5321281e28d07a2b80f4a7f922fdb1718459ded84c8fb4435
                                                                                                • Instruction Fuzzy Hash: 5DD12771D00310AFFB21AF77888166E7BA4BF01368F45416FF945A7381EA399E418B9D
                                                                                                APIs
                                                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413F5E
                                                                                                • LoadLibraryA.KERNEL32(?), ref: 00413FA0
                                                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413FC0
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00413FC7
                                                                                                • LoadLibraryA.KERNEL32(?), ref: 00413FFF
                                                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414011
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414018
                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00414027
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 0041403E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                • API String ID: 2490988753-744132762
                                                                                                • Opcode ID: a1ebb0e7ad90273c6050595515f5be941597b1bff8e5ee6fc120c50391cee153
                                                                                                • Instruction ID: be6955175b5ce73d91635d8a52bfbd354ab09fdd92d7e760b1966c561f7cb5d0
                                                                                                • Opcode Fuzzy Hash: a1ebb0e7ad90273c6050595515f5be941597b1bff8e5ee6fc120c50391cee153
                                                                                                • Instruction Fuzzy Hash: B33117B280131567D320EF55DC84EDB7BDCAF89745F01092AFA88A3201D73CD98587AE
                                                                                                APIs
                                                                                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041BA51
                                                                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041BA95
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 0041BD5F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnumOpen
                                                                                                • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                • API String ID: 1332880857-3714951968
                                                                                                • Opcode ID: 3efd418213305a701cb68e843df2402042726612c0cd2b9edffbb1664b23c096
                                                                                                • Instruction ID: 1bcbf0a3cc417a03c0c35e29071d92a42b6db1fb54f2f7a4c144fc0fa0a0a3c2
                                                                                                • Opcode Fuzzy Hash: 3efd418213305a701cb68e843df2402042726612c0cd2b9edffbb1664b23c096
                                                                                                • Instruction Fuzzy Hash: 43813F311082409FD324EB11D951AEFB7E8FFD4314F10493FB586921E1EF34AA59CA9A
                                                                                                APIs
                                                                                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CCF4
                                                                                                • GetCursorPos.USER32(?), ref: 0041CD03
                                                                                                • SetForegroundWindow.USER32(?), ref: 0041CD0C
                                                                                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CD26
                                                                                                • Shell_NotifyIconA.SHELL32(00000002,00474B50), ref: 0041CD77
                                                                                                • ExitProcess.KERNEL32 ref: 0041CD7F
                                                                                                • CreatePopupMenu.USER32 ref: 0041CD85
                                                                                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CD9A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                • String ID: Close
                                                                                                • API String ID: 1657328048-3535843008
                                                                                                • Opcode ID: bed582d39fc96e8479943e4d89b527f8ff9ef20370aed2009df63d45acb158b0
                                                                                                • Instruction ID: 460fc807693895ecf387abb2373bcbc61375cccb84b7011694e880842115b21a
                                                                                                • Opcode Fuzzy Hash: bed582d39fc96e8479943e4d89b527f8ff9ef20370aed2009df63d45acb158b0
                                                                                                • Instruction Fuzzy Hash: F321F831140205EFDB054FA4FD4DBAA3F65EB04702F004539FA0AA41B1DBB6ED91EB59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$Info
                                                                                                • String ID:
                                                                                                • API String ID: 2509303402-0
                                                                                                • Opcode ID: 39c5139744f4540f523a9af4ed2fa8afb712fe0565144d4bd577e3f50ea1b080
                                                                                                • Instruction ID: de18a1b700a064f56ed707831433d851a0809218b1b1d193042f08ca5b0df7c8
                                                                                                • Opcode Fuzzy Hash: 39c5139744f4540f523a9af4ed2fa8afb712fe0565144d4bd577e3f50ea1b080
                                                                                                • Instruction Fuzzy Hash: 59B190719006059FEF11DF69C881BEEBBF4FF09304F14406EF895AB252DA799C459B24
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                                • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                                • __aulldiv.LIBCMT ref: 00407FE9
                                                                                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                                • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                                • API String ID: 1884690901-2582957567
                                                                                                • Opcode ID: 80bdea7d367ef9bc36dcf12061529919585d96b3f60d121c639dfc4db47e6900
                                                                                                • Instruction ID: fe8c5194ffe86d3827a7b181bfbb3d0fd3c62202293e6b84b2d5449ede98e066
                                                                                                • Opcode Fuzzy Hash: 80bdea7d367ef9bc36dcf12061529919585d96b3f60d121c639dfc4db47e6900
                                                                                                • Instruction Fuzzy Hash: 73B182716083409BC614FB25C892BAFB7E5AFD4314F40492EF889632D2EF789945C79B
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                • _free.LIBCMT ref: 10007CFB
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 10007D1D
                                                                                                • _free.LIBCMT ref: 10007D32
                                                                                                • _free.LIBCMT ref: 10007D3D
                                                                                                • _free.LIBCMT ref: 10007D5F
                                                                                                • _free.LIBCMT ref: 10007D72
                                                                                                • _free.LIBCMT ref: 10007D80
                                                                                                • _free.LIBCMT ref: 10007D8B
                                                                                                • _free.LIBCMT ref: 10007DC3
                                                                                                • _free.LIBCMT ref: 10007DCA
                                                                                                • _free.LIBCMT ref: 10007DE7
                                                                                                • _free.LIBCMT ref: 10007DFF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 004502C1
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F510
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F522
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F534
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F546
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F558
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F56A
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F57C
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F58E
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5A0
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5B2
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5C4
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5D6
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5E8
                                                                                                • _free.LIBCMT ref: 004502B6
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 004502D8
                                                                                                • _free.LIBCMT ref: 004502ED
                                                                                                • _free.LIBCMT ref: 004502F8
                                                                                                • _free.LIBCMT ref: 0045031A
                                                                                                • _free.LIBCMT ref: 0045032D
                                                                                                • _free.LIBCMT ref: 0045033B
                                                                                                • _free.LIBCMT ref: 00450346
                                                                                                • _free.LIBCMT ref: 0045037E
                                                                                                • _free.LIBCMT ref: 00450385
                                                                                                • _free.LIBCMT ref: 004503A2
                                                                                                • _free.LIBCMT ref: 004503BA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: 0aefceb04b648aea5efd53e91dec8318d050154b6956abd82aee10787160205d
                                                                                                • Instruction ID: 8d5a52dc196ca223d521196e0170462af54da78aea2ffa7a7b46d1c1532e12ca
                                                                                                • Opcode Fuzzy Hash: 0aefceb04b648aea5efd53e91dec8318d050154b6956abd82aee10787160205d
                                                                                                • Instruction Fuzzy Hash: 57316F355003009FEB20AA79D84AB5B73E9EF01365F51445FF88AD7652DF38AC48D719
                                                                                                APIs
                                                                                                  • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                  • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                  • Part of subcall function 00412735: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                                                                                  • Part of subcall function 00412735: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                                                                                  • Part of subcall function 00412735: RegCloseKey.KERNEL32(00000000), ref: 00412775
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C826
                                                                                                • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$PSG$Temp$exepath$open
                                                                                                • API String ID: 1913171305-1605470806
                                                                                                • Opcode ID: dd08c6f892567b93dace68c1fa5d4b5a53396e3b13fbab62c875ddff1720d4d3
                                                                                                • Instruction ID: 0a59ab1ac2652dc6c4b0de1f1bfb113b457f9f33def171b9a9917dadcc9857af
                                                                                                • Opcode Fuzzy Hash: dd08c6f892567b93dace68c1fa5d4b5a53396e3b13fbab62c875ddff1720d4d3
                                                                                                • Instruction Fuzzy Hash: 2E416D329101185ACB14F761DC56DFE7779AF50708F10417FF806B31E2EE786A8ACA98
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: b030283a6c0ce51ba92dd09d555ed862ebb201d4cb761b5ee972a13664eb7e13
                                                                                                • Instruction ID: 986e8a668492dbee8f9f46891c6c86f5dcf9ebf43b9fca0c5b911ed3811bef24
                                                                                                • Opcode Fuzzy Hash: b030283a6c0ce51ba92dd09d555ed862ebb201d4cb761b5ee972a13664eb7e13
                                                                                                • Instruction Fuzzy Hash: 1FC15371D40204BBEB20EAA8CC82FEE77B89B08704F15416AFE45FB282D6749D459768
                                                                                                APIs
                                                                                                  • Part of subcall function 00454860: CreateFileW.KERNEL32(00000000,?,?,;LE,?,?,00000000,?,00454C3B,00000000,0000000C), ref: 0045487D
                                                                                                • GetLastError.KERNEL32 ref: 00454CA6
                                                                                                • __dosmaperr.LIBCMT ref: 00454CAD
                                                                                                • GetFileType.KERNEL32(00000000), ref: 00454CB9
                                                                                                • GetLastError.KERNEL32 ref: 00454CC3
                                                                                                • __dosmaperr.LIBCMT ref: 00454CCC
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00454CEC
                                                                                                • CloseHandle.KERNEL32(?), ref: 00454E36
                                                                                                • GetLastError.KERNEL32 ref: 00454E68
                                                                                                • __dosmaperr.LIBCMT ref: 00454E6F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                • String ID: H
                                                                                                • API String ID: 4237864984-2852464175
                                                                                                • Opcode ID: 7241ecee4a5f1f89fc763009d89c6ec11b2c57897b1f7dc41199f6beedf99759
                                                                                                • Instruction ID: a1ee14646c220e05fb339a94c39d658440f80e8cb8884f5184f0ba1168eb6fd8
                                                                                                • Opcode Fuzzy Hash: 7241ecee4a5f1f89fc763009d89c6ec11b2c57897b1f7dc41199f6beedf99759
                                                                                                • Instruction Fuzzy Hash: EBA126319045489FDF19DF68D8427AE7BB1EB46329F14015EEC01AF392CB398896CB5A
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00419323
                                                                                                • GdiplusStartup.GDIPLUS(00474AF4,?,00000000), ref: 00419355
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004193E1
                                                                                                • Sleep.KERNEL32(000003E8), ref: 00419463
                                                                                                • GetLocalTime.KERNEL32(?), ref: 00419472
                                                                                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041955B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$VG$VG
                                                                                                • API String ID: 489098229-455837001
                                                                                                • Opcode ID: 92f7b4923305aa32c89fe571e855d6589c495986d7bade82338304b44666fde6
                                                                                                • Instruction ID: fd6a6a94d4e700b4a78141c9ee43bb9ee9cebd21b8d39b126fa21a823fd8be24
                                                                                                • Opcode Fuzzy Hash: 92f7b4923305aa32c89fe571e855d6589c495986d7bade82338304b44666fde6
                                                                                                • Instruction Fuzzy Hash: 9F517B71A002449ACB14BBB5C866AFE7BA9AB55308F40403FF845B71D2EF3C5E85C799
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 65535$udp
                                                                                                • API String ID: 0-1267037602
                                                                                                • Opcode ID: ca54308d78d3c4eee7f7b8de95e44a5f1974b5ba6ce0b2e83d9cd08af329ba0f
                                                                                                • Instruction ID: c3bfc2202edcb816331f8b78e042012e01f064b481147a6b300cfea58c86e196
                                                                                                • Opcode Fuzzy Hash: ca54308d78d3c4eee7f7b8de95e44a5f1974b5ba6ce0b2e83d9cd08af329ba0f
                                                                                                • Instruction Fuzzy Hash: E241F4716093029BD7209F28D905BBB3BA4EB84742F04042FF98593391EB6DDEC1866E
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004395C9
                                                                                                • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004395D6
                                                                                                • __dosmaperr.LIBCMT ref: 004395DD
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439609
                                                                                                • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439613
                                                                                                • __dosmaperr.LIBCMT ref: 0043961A
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043965D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439667
                                                                                                • __dosmaperr.LIBCMT ref: 0043966E
                                                                                                • _free.LIBCMT ref: 0043967A
                                                                                                • _free.LIBCMT ref: 00439681
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                • String ID:
                                                                                                • API String ID: 2441525078-0
                                                                                                • Opcode ID: 7d25b48f924a9fae5a5881453bd469cfe57fd0c2e6412707544dbbd620f0408d
                                                                                                • Instruction ID: 4e2bc3e06b1619faa1414a7a2c806c5d1514cda6e297fdc8b1054bbcfea92265
                                                                                                • Opcode Fuzzy Hash: 7d25b48f924a9fae5a5881453bd469cfe57fd0c2e6412707544dbbd620f0408d
                                                                                                • Instruction Fuzzy Hash: D431E27280560ABFDF11AFA5DC459AF3B68EF09324F10015EF81066251DB39CD50DBAA
                                                                                                APIs
                                                                                                • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00404FF3
                                                                                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                • API String ID: 2956720200-749203953
                                                                                                • Opcode ID: e188dda997b620f5b772e2c38de47de40ccf2c787ee37c86bb0f0f743c2cb927
                                                                                                • Instruction ID: 290a0909c372499a911e5ffd519e5407deecd3e64339803c74491ead196e324c
                                                                                                • Opcode Fuzzy Hash: e188dda997b620f5b772e2c38de47de40ccf2c787ee37c86bb0f0f743c2cb927
                                                                                                • Instruction Fuzzy Hash: A441B1726043016BC614FB75DC568AF7BA8ABC1714F00093EF906A31E6EF38DA05C79A
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00466554), ref: 0041710A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00417113
                                                                                                • DeleteFileA.KERNEL32(00000000), ref: 00417122
                                                                                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004170D6
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                • String ID: <$@$HVG$HVG$Temp
                                                                                                • API String ID: 1107811701-2568817187
                                                                                                • Opcode ID: bc55baf6d9293fa6998002e465fe9fe966d5a1e0dac0acaf818ca3b2902bcf25
                                                                                                • Instruction ID: 91e4b2e714ed18abe86730f534b33d619c8c8851ecafca63038a632c75497fc1
                                                                                                • Opcode Fuzzy Hash: bc55baf6d9293fa6998002e465fe9fe966d5a1e0dac0acaf818ca3b2902bcf25
                                                                                                • Instruction Fuzzy Hash: 00319C31A00209ABCB04FBA1DC56AEE7775AF50308F40417EF506761E2EF785A89CB99
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419E8A
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EA1
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EAE
                                                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EBD
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419ECE
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419ED1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: fd4b3df9065e7dfd6d4a697e6f6a53e43d0cc3b02fd87625ee99f2ecddb25ff7
                                                                                                • Instruction ID: 401ec45fa9dd23e1a78cca63bf6ad54db5d4c9b9326c405a7ffc92fc58cb3c60
                                                                                                • Opcode Fuzzy Hash: fd4b3df9065e7dfd6d4a697e6f6a53e43d0cc3b02fd87625ee99f2ecddb25ff7
                                                                                                • Instruction Fuzzy Hash: 4211A331941218BBD711AB64DC85DFF3B6CDB45BA1B05002AF902A21D2DF64CD4A9AB5
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 100059EA
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 100059F6
                                                                                                • _free.LIBCMT ref: 10005A01
                                                                                                • _free.LIBCMT ref: 10005A0C
                                                                                                • _free.LIBCMT ref: 10005A17
                                                                                                • _free.LIBCMT ref: 10005A22
                                                                                                • _free.LIBCMT ref: 10005A2D
                                                                                                • _free.LIBCMT ref: 10005A38
                                                                                                • _free.LIBCMT ref: 10005A43
                                                                                                • _free.LIBCMT ref: 10005A51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00446FEF
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 00446FFB
                                                                                                • _free.LIBCMT ref: 00447006
                                                                                                • _free.LIBCMT ref: 00447011
                                                                                                • _free.LIBCMT ref: 0044701C
                                                                                                • _free.LIBCMT ref: 00447027
                                                                                                • _free.LIBCMT ref: 00447032
                                                                                                • _free.LIBCMT ref: 0044703D
                                                                                                • _free.LIBCMT ref: 00447048
                                                                                                • _free.LIBCMT ref: 00447056
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 6cab9f7d569f345c7814ae43f5c160195df6b64f63ea78a6b18b8aa73aee7787
                                                                                                • Instruction ID: 9fec27c2adf71536e74eabd4120179072dbaa777ef3671cded9c13d0800a1e4b
                                                                                                • Opcode Fuzzy Hash: 6cab9f7d569f345c7814ae43f5c160195df6b64f63ea78a6b18b8aa73aee7787
                                                                                                • Instruction Fuzzy Hash: 86119B7550011CBFDB05EF55C882CDD3BB5EF05364B9240AAF9494F222DA35DE50EB49
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Eventinet_ntoa
                                                                                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                • API String ID: 3578746661-3604713145
                                                                                                • Opcode ID: 2fb4b73228407612c81141784a645541a6588eae5ce87a473578b323964d6363
                                                                                                • Instruction ID: 73c74054356758d85ec5353b0407031f458931cc5dd6312d5a4dd957febfbb04
                                                                                                • Opcode Fuzzy Hash: 2fb4b73228407612c81141784a645541a6588eae5ce87a473578b323964d6363
                                                                                                • Instruction Fuzzy Hash: 5851A4316043005BCA14FB75D95AAAE36A59B84318F00453FF809972E1DFBC9D85C78E
                                                                                                APIs
                                                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455FBF), ref: 0045536C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DecodePointer
                                                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                • API String ID: 3527080286-3064271455
                                                                                                • Opcode ID: fcb8f87b81c24025c8faa1ed3748b23e21aaaa522dc2b9ab90eaf932e2f1aeea
                                                                                                • Instruction ID: 83316d2fa1d48b2f4155984bd6892a75fd3c5afb36d5e99e95f82d48d48c5a2a
                                                                                                • Opcode Fuzzy Hash: fcb8f87b81c24025c8faa1ed3748b23e21aaaa522dc2b9ab90eaf932e2f1aeea
                                                                                                • Instruction Fuzzy Hash: 93516C70900A09DBCF10DF58D5581BDBBB0FB0A306F204197DC81A7326DB798A6C8B1E
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                                                • __fassign.LIBCMT ref: 1000954F
                                                                                                • __fassign.LIBCMT ref: 1000956A
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                                                • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 1324828854-746054323
                                                                                                • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00416842
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • Sleep.KERNEL32(00000064), ref: 0041686E
                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 004168A2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                • API String ID: 1462127192-2001430897
                                                                                                • Opcode ID: 4f3320846c8d1e082053ab783137bc39505d6e8c69a6736bae12da9828b0e9cc
                                                                                                • Instruction ID: c4be9e9118a59201799f54b99a9a171b680bb642a7e99c3b30ff6139130205e5
                                                                                                • Opcode Fuzzy Hash: 4f3320846c8d1e082053ab783137bc39505d6e8c69a6736bae12da9828b0e9cc
                                                                                                • Instruction Fuzzy Hash: 1B313E719001189ADB04FBA1DC96EEE7764AF50708F00417FF946730D2EF786A8ACA9D
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00475A50,00000000,004752F0,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                                • GetCurrentProcess.KERNEL32(00475A50,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\plugmancrypted.exe), ref: 00406705
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentProcess
                                                                                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                • API String ID: 2050909247-4242073005
                                                                                                • Opcode ID: 3d4dde61fac8f932cecf13147f1715ad91c8a5d9075df555c2e0fc840e87cdfb
                                                                                                • Instruction ID: 2a8ac338152687dbadce55b3d6de3572d7837fd421bef744f3a625c24d449dc1
                                                                                                • Opcode Fuzzy Hash: 3d4dde61fac8f932cecf13147f1715ad91c8a5d9075df555c2e0fc840e87cdfb
                                                                                                • Instruction Fuzzy Hash: B231B671600700AFD300AF65DC8AF5677A8FB44709F11053EF50ABB6E1EBB9A8548B6D
                                                                                                APIs
                                                                                                • _strftime.LIBCMT ref: 00401AD3
                                                                                                  • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                • waveInUnprepareHeader.WINMM(00472AC0,00000020,00000000,?), ref: 00401B85
                                                                                                • waveInPrepareHeader.WINMM(00472AC0,00000020), ref: 00401BC3
                                                                                                • waveInAddBuffer.WINMM(00472AC0,00000020), ref: 00401BD2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                                • API String ID: 3809562944-243156785
                                                                                                • Opcode ID: a052e9acd675deadaa6d6717eb8cacda06c15b15249c0af5c26ada239b7a9a2c
                                                                                                • Instruction ID: b0e15ff03f11dcb3e5bfd7c1448581b7ace3962aa9bffbd159c0990beee9d81b
                                                                                                • Opcode Fuzzy Hash: a052e9acd675deadaa6d6717eb8cacda06c15b15249c0af5c26ada239b7a9a2c
                                                                                                • Instruction Fuzzy Hash: 7E315E315043019FC324EB21DC56A9E77A4FB94314F00493EF559A21F1EFB8AA89CB9A
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041CB93
                                                                                                  • Part of subcall function 0041CC2A: RegisterClassExA.USER32(00000030), ref: 0041CC77
                                                                                                  • Part of subcall function 0041CC2A: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CC92
                                                                                                  • Part of subcall function 0041CC2A: GetLastError.KERNEL32 ref: 0041CC9C
                                                                                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041CBCA
                                                                                                • lstrcpynA.KERNEL32(00474B68,Remcos,00000080), ref: 0041CBE4
                                                                                                • Shell_NotifyIconA.SHELL32(00000000,00474B50), ref: 0041CBFA
                                                                                                • TranslateMessage.USER32(?), ref: 0041CC06
                                                                                                • DispatchMessageA.USER32(?), ref: 0041CC10
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CC1D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                • String ID: Remcos
                                                                                                • API String ID: 1970332568-165870891
                                                                                                • Opcode ID: 7a949f86bc247f3cbdd076edfe2cda77560b6c3ffe772df9fdb29a851d56ec4a
                                                                                                • Instruction ID: 6591afd7fea275f101bd811abb8745f55115b26a2df550b070e187602390ba30
                                                                                                • Opcode Fuzzy Hash: 7a949f86bc247f3cbdd076edfe2cda77560b6c3ffe772df9fdb29a851d56ec4a
                                                                                                • Instruction Fuzzy Hash: 130112B1940344ABD7109BA5EC4DFEABBBCA7C5B05F004029E615A2061EFB8E585CB6D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b79e0bacf68e79f56bbfbff6a95aeb92d11d955db7cfd18af0a5c0e52fbe5259
                                                                                                • Instruction ID: 8081305e108bfff8a8e14cd18a234b42858a69a1a1930647e7f2335dd99175ec
                                                                                                • Opcode Fuzzy Hash: b79e0bacf68e79f56bbfbff6a95aeb92d11d955db7cfd18af0a5c0e52fbe5259
                                                                                                • Instruction Fuzzy Hash: 44C105B0D04249AFEF11DFA9C8417BEBBB4EF09314F04415AE544A7392C738D941CBA9
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00453013,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452DE6
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452E69
                                                                                                • __alloca_probe_16.LIBCMT ref: 00452EA1
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00453013,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452EFC
                                                                                                • __alloca_probe_16.LIBCMT ref: 00452F4B
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452F13
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452F8F
                                                                                                • __freea.LIBCMT ref: 00452FBA
                                                                                                • __freea.LIBCMT ref: 00452FC6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                • String ID:
                                                                                                • API String ID: 201697637-0
                                                                                                • Opcode ID: 636d8ee8978a4b28d28c899fe5287c94f7ea3d2e518637072967bc6aea0c1ce5
                                                                                                • Instruction ID: e285173fe66e9ab68cc8b5f7bb46492c032c90826bba7407019ac45f59d87ef3
                                                                                                • Opcode Fuzzy Hash: 636d8ee8978a4b28d28c899fe5287c94f7ea3d2e518637072967bc6aea0c1ce5
                                                                                                • Instruction Fuzzy Hash: E991D572E002169BDF208E64DA41AEFBBB5AF0A312F14055BFC05E7242D778DC48C768
                                                                                                APIs
                                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 1454806937-0
                                                                                                • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • _memcmp.LIBVCRUNTIME ref: 004448B3
                                                                                                • _free.LIBCMT ref: 00444924
                                                                                                • _free.LIBCMT ref: 0044493D
                                                                                                • _free.LIBCMT ref: 0044496F
                                                                                                • _free.LIBCMT ref: 00444978
                                                                                                • _free.LIBCMT ref: 00444984
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                • String ID: C
                                                                                                • API String ID: 1679612858-1037565863
                                                                                                • Opcode ID: 614205798ad6061f3d9420df6d0f7eb30440e43e095dda7afa9147f4421e103d
                                                                                                • Instruction ID: ce46d41f1d9e01bafc0896c2bb0d2adb680072b6a59d341745b23d3028246374
                                                                                                • Opcode Fuzzy Hash: 614205798ad6061f3d9420df6d0f7eb30440e43e095dda7afa9147f4421e103d
                                                                                                • Instruction Fuzzy Hash: 24B14975A012199FEB24DF18C884BAEB7B4FF49314F1045AEE849A7351D738AE90CF48
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tcp$udp
                                                                                                • API String ID: 0-3725065008
                                                                                                • Opcode ID: af4d639371690cb8637a3a63659cf8324f890a8ac4b6ebd8bb2dc9423f2fa13d
                                                                                                • Instruction ID: 641150f3fd0ea6af627c79cdc5c75230aa36f57d28899e04d0661f3c05bf373f
                                                                                                • Opcode Fuzzy Hash: af4d639371690cb8637a3a63659cf8324f890a8ac4b6ebd8bb2dc9423f2fa13d
                                                                                                • Instruction Fuzzy Hash: 0D71D1716083528FDB24CF1994846ABB7E0AF84746F14442FF885A7352E77CDE81CB8A
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                • __freea.LIBCMT ref: 10008A08
                                                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                • __freea.LIBCMT ref: 10008A11
                                                                                                • __freea.LIBCMT ref: 10008A36
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 1414292761-746054323
                                                                                                • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm$|/Hn/
                                                                                                • API String ID: 1170836740-3126015354
                                                                                                • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00466454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                                  • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                  • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                • String ID: .part
                                                                                                • API String ID: 1303771098-3499674018
                                                                                                • Opcode ID: d3f004356eeff77312f7a0c21a977423bd7a5a7ddad4389072e8ba8cbefc82ff
                                                                                                • Instruction ID: 7eae26b3d9efd85ab9a821acf87acbbc445967fcd6ce231ca79d13f55b5b668b
                                                                                                • Opcode Fuzzy Hash: d3f004356eeff77312f7a0c21a977423bd7a5a7ddad4389072e8ba8cbefc82ff
                                                                                                • Instruction Fuzzy Hash: C631A4715083019FD210EF21DD459AFB7A8FB84755F40093EF9C6B21A1DF38AA48CB9A
                                                                                                APIs
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                • waveInOpen.WINMM(00472AF8,000000FF,00472B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                                • waveInPrepareHeader.WINMM(00472AC0,00000020,00000000), ref: 00401A66
                                                                                                • waveInAddBuffer.WINMM(00472AC0,00000020), ref: 00401A75
                                                                                                • waveInStart.WINMM ref: 00401A81
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                • String ID: dMG$|MG
                                                                                                • API String ID: 1356121797-1683252805
                                                                                                • Opcode ID: 90184a660b4496401ca2bd395970f68dae25d6e8355fffeefbf0e1e22ce1cb2f
                                                                                                • Instruction ID: 140f40b68b7a2e7574469051551963e155d477b90c1392cdc23a62cf20397fe9
                                                                                                • Opcode Fuzzy Hash: 90184a660b4496401ca2bd395970f68dae25d6e8355fffeefbf0e1e22ce1cb2f
                                                                                                • Instruction Fuzzy Hash: 52215C316002019BC725DF66EE1996A7BA6FB84710B00883EF50DE76B0DBF898C0CB5C
                                                                                                APIs
                                                                                                • AllocConsole.KERNEL32(004750FC), ref: 0041C0C4
                                                                                                • GetConsoleWindow.KERNEL32 ref: 0041C0CA
                                                                                                • ShowWindow.USER32(00000000,00000000), ref: 0041C0DD
                                                                                                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041C102
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Console$Window$AllocOutputShow
                                                                                                • String ID: Remcos v$6.0.0 Pro$CONOUT$
                                                                                                • API String ID: 4067487056-3561919337
                                                                                                • Opcode ID: 51f71f4df576cdb042b408fdcee2c306aad9b55f4cf694b49fe88f2f6d88a06c
                                                                                                • Instruction ID: 9cd6404a4583bb7861016a5e8077681a34a6ce6b29b6da971a73374578d830bb
                                                                                                • Opcode Fuzzy Hash: 51f71f4df576cdb042b408fdcee2c306aad9b55f4cf694b49fe88f2f6d88a06c
                                                                                                • Instruction Fuzzy Hash: 750121B1A80304BADA10F7F19D4BF9976AC6B14B09F500426BA05A70C2EEB8A554462D
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D774,0043D774,?,?,?,00449DB1,00000001,00000001,1AE85006), ref: 00449BBA
                                                                                                • __alloca_probe_16.LIBCMT ref: 00449BF2
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449DB1,00000001,00000001,1AE85006,?,?,?), ref: 00449C40
                                                                                                • __alloca_probe_16.LIBCMT ref: 00449CD7
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449D3A
                                                                                                • __freea.LIBCMT ref: 00449D47
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • __freea.LIBCMT ref: 00449D50
                                                                                                • __freea.LIBCMT ref: 00449D75
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3864826663-0
                                                                                                • Opcode ID: 45550f184a61a9f8ddf17f24dc0c1f131df532b020593bc4805c091103afbf88
                                                                                                • Instruction ID: b9264d00d576e3e69c3e593975f72d59ef517f4fd458bc34bb1ef2c80a576446
                                                                                                • Opcode Fuzzy Hash: 45550f184a61a9f8ddf17f24dc0c1f131df532b020593bc4805c091103afbf88
                                                                                                • Instruction Fuzzy Hash: 3651F8B2A10206AFFB258F65DC82EBF77A9EB44754F15462EFC05DB240EB38DC409658
                                                                                                APIs
                                                                                                • SendInput.USER32 ref: 00418CFE
                                                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00418D26
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D4D
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D6B
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D8B
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418DB0
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418DD2
                                                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00418DF5
                                                                                                  • Part of subcall function 00418CA7: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418CAD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InputSend$Virtual
                                                                                                • String ID:
                                                                                                • API String ID: 1167301434-0
                                                                                                • Opcode ID: 03d106074c487e793b96b2f05eb270ad55284c326fdeb905245ef2a17d2a5417
                                                                                                • Instruction ID: 141eef32e971302722b3407f09031bac5ba220a7556c2b6a6b809b2d6bbc12e7
                                                                                                • Opcode Fuzzy Hash: 03d106074c487e793b96b2f05eb270ad55284c326fdeb905245ef2a17d2a5417
                                                                                                • Instruction Fuzzy Hash: 2D318031258349A9E210DF65DC41FDFBBECAFC9B08F04080FB58457191EAA4858C87AB
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 00415BDE
                                                                                                • EmptyClipboard.USER32 ref: 00415BEC
                                                                                                • CloseClipboard.USER32 ref: 00415BF2
                                                                                                • OpenClipboard.USER32 ref: 00415BF9
                                                                                                • GetClipboardData.USER32(0000000D), ref: 00415C09
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415C12
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415C1B
                                                                                                • CloseClipboard.USER32 ref: 00415C21
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                • String ID:
                                                                                                • API String ID: 2172192267-0
                                                                                                • Opcode ID: 92a2470462e6ffdfc863b5976618625e6f3cdac6dc0af384211fdddf1e35a528
                                                                                                • Instruction ID: 369576e1793333014f6cd695595c81a654a0099a6e7e621b1e9fba3c04e1709a
                                                                                                • Opcode Fuzzy Hash: 92a2470462e6ffdfc863b5976618625e6f3cdac6dc0af384211fdddf1e35a528
                                                                                                • Instruction Fuzzy Hash: EE0152322003009FC350BF71DC59AAE77A5AF80B42F00443FFD06A61A2EF35C949C659
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __freea$__alloca_probe_16
                                                                                                • String ID: a/p$am/pm$hD
                                                                                                • API String ID: 3509577899-3668228793
                                                                                                • Opcode ID: 44ea5ac924aea223c25ec6af7a156dea15db996b08b3c9c3fe5b3e61d2d79652
                                                                                                • Instruction ID: deb853d5fd6adf3918d69246e21912660bd894b39407ab32d9d7da7685977c7a
                                                                                                • Opcode Fuzzy Hash: 44ea5ac924aea223c25ec6af7a156dea15db996b08b3c9c3fe5b3e61d2d79652
                                                                                                • Instruction Fuzzy Hash: 1CD111719002069AFB289F68C9857BBB7B0FF06708F26415BE9019B355D33D9D81CB6B
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 1d80ecd898b2873860388bfd90a69a91c38572b88f559cfcb1da031a1a01905e
                                                                                                • Instruction ID: 0b2e84c71dbf843dbcc2e99f9f8dbab27ea7d8a4e4ef3fbdb467abc62f582456
                                                                                                • Opcode Fuzzy Hash: 1d80ecd898b2873860388bfd90a69a91c38572b88f559cfcb1da031a1a01905e
                                                                                                • Instruction Fuzzy Hash: E061E271D00244AFEB20DF69C842BAABBF4EB4A320F24407BED45EB251D734AD45DB58
                                                                                                APIs
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • _free.LIBCMT ref: 00444296
                                                                                                • _free.LIBCMT ref: 004442AD
                                                                                                • _free.LIBCMT ref: 004442CC
                                                                                                • _free.LIBCMT ref: 004442E7
                                                                                                • _free.LIBCMT ref: 004442FE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$AllocateHeap
                                                                                                • String ID: Z9D
                                                                                                • API String ID: 3033488037-3781130823
                                                                                                • Opcode ID: 1e396c4f324de9ddb7b01a7129941a49517c4d4e7f7401902ff7e7d19c1db4b4
                                                                                                • Instruction ID: 86c8eacfe83d9672290f1135950403671a27bde0e5aa55c461cabd1b4ee88ac5
                                                                                                • Opcode Fuzzy Hash: 1e396c4f324de9ddb7b01a7129941a49517c4d4e7f7401902ff7e7d19c1db4b4
                                                                                                • Instruction Fuzzy Hash: D551B171A00304AFEB20DF6AC881B6A77F4FF95724B1446AEF809D7650E779DA01CB48
                                                                                                APIs
                                                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045E478), ref: 00448289
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0047279C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448301
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727F0,000000FF,?,0000003F,00000000,?), ref: 0044832E
                                                                                                • _free.LIBCMT ref: 00448277
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 00448443
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                • String ID: xE
                                                                                                • API String ID: 1286116820-407097786
                                                                                                • Opcode ID: 1f630aa574f8f032912558e332746922b811222e22d4e5e5c8fa9a473f36de46
                                                                                                • Instruction ID: 82a604bb7294b81f3f73b5ad664ce4632eb81d562d18d3de5c52697f85b56542
                                                                                                • Opcode Fuzzy Hash: 1f630aa574f8f032912558e332746922b811222e22d4e5e5c8fa9a473f36de46
                                                                                                • Instruction Fuzzy Hash: 43510871900219ABEB14EF698D819AE77BCEF44B14F1002AFF854A3291EF788D418B5C
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044AA48,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A315
                                                                                                • __fassign.LIBCMT ref: 0044A390
                                                                                                • __fassign.LIBCMT ref: 0044A3AB
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A3D1
                                                                                                • WriteFile.KERNEL32(?,00000000,00000000,0044AA48,00000000,?,?,?,?,?,?,?,?,?,0044AA48,?), ref: 0044A3F0
                                                                                                • WriteFile.KERNEL32(?,?,00000001,0044AA48,00000000,?,?,?,?,?,?,?,?,?,0044AA48,?), ref: 0044A429
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1324828854-0
                                                                                                • Opcode ID: 19793b4b6baa09b5fac30a83039e1f9c1b1fc09f5707b87a30c95e6118fc2717
                                                                                                • Instruction ID: 781c03a50f1c813746d4e14bf3c61566c92396d5579059589c4d950ed669b936
                                                                                                • Opcode Fuzzy Hash: 19793b4b6baa09b5fac30a83039e1f9c1b1fc09f5707b87a30c95e6118fc2717
                                                                                                • Instruction Fuzzy Hash: 6551C474E002499FDB10CFA8D845AEEBBF4EF09300F14412BE955E7291E774A951CB6A
                                                                                                APIs
                                                                                                • ExitThread.KERNEL32 ref: 004017F4
                                                                                                  • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                                                                                  • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                                                                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401902
                                                                                                  • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                                                                                • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                                  • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                                                                                  • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                • String ID: XMG$NG$NG
                                                                                                • API String ID: 1596592924-1283814050
                                                                                                • Opcode ID: 280e7fb6a5fb3f6c04997b8ea553e7f351e04fbc78b76e9b8ba4bbaedc56c9d4
                                                                                                • Instruction ID: a5e0bc9ac4bbc073a85812dd1d3adb1d2a3c84d0b98f0a89840e4e641ba94373
                                                                                                • Opcode Fuzzy Hash: 280e7fb6a5fb3f6c04997b8ea553e7f351e04fbc78b76e9b8ba4bbaedc56c9d4
                                                                                                • Instruction Fuzzy Hash: 5341B4712042008BC329FB65DD96AAE7395EB94318F10453FF54AA31F2DF389986CB5E
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412D99
                                                                                                  • Part of subcall function 00412A82: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412AF5
                                                                                                  • Part of subcall function 00412A82: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412B24
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                • RegCloseKey.ADVAPI32(TeFTeF,00466554,00466554,00466900,00466900,00000071), ref: 00412F09
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnumInfoOpenQuerysend
                                                                                                • String ID: TeFTeF$NG$TG$TG
                                                                                                • API String ID: 3114080316-826076573
                                                                                                • Opcode ID: 40c2c3064926c82c932c74a3b6a72a20f42c8ba98c559f976b21799d47ee187f
                                                                                                • Instruction ID: 217e792c851e8857c64f97df11b7492b8bc11e7bd79a931969a0b124146415da
                                                                                                • Opcode Fuzzy Hash: 40c2c3064926c82c932c74a3b6a72a20f42c8ba98c559f976b21799d47ee187f
                                                                                                • Instruction Fuzzy Hash: ED41A1316042005BD224F725D8A2AEF7395AFD0308F50843FF94A671E2EF7C5D4986AE
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437CBB
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00437CC3
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437D51
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00437D7C
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437DD1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: e20e4e91601e7da6f84b85b393d4409c90c36ea595a33a74ae9b4edf16c34eae
                                                                                                • Instruction ID: 1103995f59bc857a00dd0af833384e4a9f5f4a2e3f3cb1d3a3c35a3a433dd29e
                                                                                                • Opcode Fuzzy Hash: e20e4e91601e7da6f84b85b393d4409c90c36ea595a33a74ae9b4edf16c34eae
                                                                                                • Instruction Fuzzy Hash: 4E410674A042099BCF20DF29C844AAE7BA5AF4C328F14905AEC55AB392D739DD45CF98
                                                                                                APIs
                                                                                                  • Part of subcall function 004125EB: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                                                                                  • Part of subcall function 004125EB: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                                                                                  • Part of subcall function 004125EB: RegCloseKey.KERNEL32(?), ref: 00412637
                                                                                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                • API String ID: 1133728706-4073444585
                                                                                                • Opcode ID: 9ea441c43c218c15c753ecfa3edbc9b95c45c425e5edeefb71c9492039f6e975
                                                                                                • Instruction ID: 7ed93d3ebd4d115a7197ccd8f2df160251767479400bef64a6787df62d4369c8
                                                                                                • Opcode Fuzzy Hash: 9ea441c43c218c15c753ecfa3edbc9b95c45c425e5edeefb71c9492039f6e975
                                                                                                • Instruction Fuzzy Hash: 29215C31A1410966CB04F7B2CCA69EE7764AE94318F40013FA902771D2EF789A4986DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cfbae8f3dcd2e5f3bdf3bcee8d3106cebccc1d81cd58107c476234e6777acd1f
                                                                                                • Instruction ID: 890753aa9dfb888b2a1585f98a5e225511b13b718af609ae416a1884f745cca0
                                                                                                • Opcode Fuzzy Hash: cfbae8f3dcd2e5f3bdf3bcee8d3106cebccc1d81cd58107c476234e6777acd1f
                                                                                                • Instruction Fuzzy Hash: 3A112472504A15BFDB206F729C08D3B3AACEB82736F20016EFC15D7282DE38C800C669
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FCD4
                                                                                                • int.LIBCPMT ref: 0040FCE7
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::_Lockit.LIBCPMT ref: 0040CFC4
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CFDE
                                                                                                • std::_Facet_Register.LIBCPMT ref: 0040FD23
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FD49
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FD65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                • String ID: xkG
                                                                                                • API String ID: 2536120697-3406988965
                                                                                                • Opcode ID: 4b6f72b1e0d08092fd2688f9826419a51511b3482868562e895aff95ac9ad519
                                                                                                • Instruction ID: 7cf641d0f45d7e480cf6c67891cb53e845b1d2cd586d61112ae60f6436568b55
                                                                                                • Opcode Fuzzy Hash: 4b6f72b1e0d08092fd2688f9826419a51511b3482868562e895aff95ac9ad519
                                                                                                • Instruction Fuzzy Hash: 3B11F032900119A7CB14FBA5D8429DEB7689E55358F10013BF809B72D1EB3CAF49C7D9
                                                                                                APIs
                                                                                                  • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                • _free.LIBCMT ref: 100092AB
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 100092B6
                                                                                                • _free.LIBCMT ref: 100092C1
                                                                                                • _free.LIBCMT ref: 10009315
                                                                                                • _free.LIBCMT ref: 10009320
                                                                                                • _free.LIBCMT ref: 1000932B
                                                                                                • _free.LIBCMT ref: 10009336
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                APIs
                                                                                                  • Part of subcall function 0044FC32: _free.LIBCMT ref: 0044FC5B
                                                                                                • _free.LIBCMT ref: 0044FF39
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 0044FF44
                                                                                                • _free.LIBCMT ref: 0044FF4F
                                                                                                • _free.LIBCMT ref: 0044FFA3
                                                                                                • _free.LIBCMT ref: 0044FFAE
                                                                                                • _free.LIBCMT ref: 0044FFB9
                                                                                                • _free.LIBCMT ref: 0044FFC4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                • Instruction ID: 7d3bb130547cbd64d3bc6acdbb054c191a8682768e3bc5df2cfa43195c7f437f
                                                                                                • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                • Instruction Fuzzy Hash: 3611603158175CAAE930B7B2CC87FCB779CFF01744F804C2EB69B66052DA2CB90A5655
                                                                                                APIs
                                                                                                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\plugmancrypted.exe), ref: 00406835
                                                                                                  • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                                  • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004669B0,00000000), ref: 004067E9
                                                                                                • CoUninitialize.OLE32 ref: 0040688E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InitializeObjectUninitialize_wcslen
                                                                                                • String ID: C:\Users\user\Desktop\plugmancrypted.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                • API String ID: 3851391207-3008093825
                                                                                                • Opcode ID: f62f8ea22737c4132ff5b3dac93a03cf3a5d885852b0606909ed978fbfad8032
                                                                                                • Instruction ID: bf5204b976fdd256b066cceb308157ad377b3c08e3874fea13dbf5f4dff6080c
                                                                                                • Opcode Fuzzy Hash: f62f8ea22737c4132ff5b3dac93a03cf3a5d885852b0606909ed978fbfad8032
                                                                                                • Instruction Fuzzy Hash: F20180722023117FE2287B21DC0EF7B6658DB4176AF12413FF946A71C1EAA9AC014679
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FFB7
                                                                                                • int.LIBCPMT ref: 0040FFCA
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::_Lockit.LIBCPMT ref: 0040CFC4
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CFDE
                                                                                                • std::_Facet_Register.LIBCPMT ref: 00410006
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0041002C
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00410048
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                • String ID: pmG
                                                                                                • API String ID: 2536120697-2472243355
                                                                                                • Opcode ID: 49ddf8ddb094ef95c775291761389dec69e80ba720e56a3ba1433f00512a79dc
                                                                                                • Instruction ID: 7757f8b08a06b45aa46d7f93aac2e311949306114fe400d1b3bff67def6a62fd
                                                                                                • Opcode Fuzzy Hash: 49ddf8ddb094ef95c775291761389dec69e80ba720e56a3ba1433f00512a79dc
                                                                                                • Instruction Fuzzy Hash: D911B231900419EBCB14FBA5D9429DD7B689E58358F10016FF40567191EB78AF86C789
                                                                                                APIs
                                                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                                • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                                Strings
                                                                                                • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                                • [Chrome Cookies not found], xrefs: 0040B308
                                                                                                • UserProfile, xrefs: 0040B2B4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast
                                                                                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                • API String ID: 2018770650-304995407
                                                                                                • Opcode ID: 65e28707c7e1a44793f2a2df382f4883d40221dfaf063d6d42e8c88958be74c3
                                                                                                • Instruction ID: 9d7a183bab8cffc7e176200adf3036985cfece21d6991fc3b8afe8d0fe8b9813
                                                                                                • Opcode Fuzzy Hash: 65e28707c7e1a44793f2a2df382f4883d40221dfaf063d6d42e8c88958be74c3
                                                                                                • Instruction Fuzzy Hash: AB01623565010557CB0477B6DD6B9AF3628ED51718B60013FF802771E2FE3A990586DE
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll$|/Hn/
                                                                                                • API String ID: 4061214504-1506303273
                                                                                                • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                APIs
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041A15A
                                                                                                • PlaySoundW.WINMM(00000000,00000000), ref: 0041A168
                                                                                                • Sleep.KERNEL32(00002710), ref: 0041A16F
                                                                                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041A178
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                • String ID: Alarm triggered$`#v
                                                                                                • API String ID: 614609389-3049340936
                                                                                                • Opcode ID: 859fac31fcb8157fef4fccd01110b6d68f3f64b9bd70d3344d64368d38890a6d
                                                                                                • Instruction ID: 198adcd2ac8b5b4b9acde76a755fda1533c143b191b85f9fe5233f4cbfc21951
                                                                                                • Opcode Fuzzy Hash: 859fac31fcb8157fef4fccd01110b6d68f3f64b9bd70d3344d64368d38890a6d
                                                                                                • Instruction Fuzzy Hash: 79E01A22A04261379520337B7D0FD6F3D28EAC7B65741006FF905A6192EE580811C6FB
                                                                                                APIs
                                                                                                • __allrem.LIBCMT ref: 00439999
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004399B5
                                                                                                • __allrem.LIBCMT ref: 004399CC
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004399EA
                                                                                                • __allrem.LIBCMT ref: 00439A01
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00439A1F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1992179935-0
                                                                                                • Opcode ID: b56df2ec526ecb605ad204b00dc5db07d06cb4bbbde3923a820af03cd63327b9
                                                                                                • Instruction ID: 5399b0f9a6461ae69e9bde9777a653eaf6085cdcce353b40ae7049a42401d5b7
                                                                                                • Opcode Fuzzy Hash: b56df2ec526ecb605ad204b00dc5db07d06cb4bbbde3923a820af03cd63327b9
                                                                                                • Instruction Fuzzy Hash: 15810B72A00706ABE724BA79CC41B6B73E89F89768F24522FF411D7781E7B8DD008758
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __cftoe
                                                                                                • String ID:
                                                                                                • API String ID: 4189289331-0
                                                                                                • Opcode ID: 59a84199312040bebd3b7080c8be9dd535ae7880d2ee6b6a8de25d9cd02a2692
                                                                                                • Instruction ID: 890c16c57639ce4616fdae23c1b2cf08611ffd87950db76db0bf4773250d0152
                                                                                                • Opcode Fuzzy Hash: 59a84199312040bebd3b7080c8be9dd535ae7880d2ee6b6a8de25d9cd02a2692
                                                                                                • Instruction Fuzzy Hash: 2C512972900205ABFB249BA98C41FAF77A9EFC8324F24411FF815D6292DB3DDD11966C
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                                  • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prologSleep
                                                                                                • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                • API String ID: 3469354165-3054508432
                                                                                                • Opcode ID: bd34410cf5f0e04b6139ef16a1dbb7268584a3412f5b8a5678b3f645dfe224c7
                                                                                                • Instruction ID: 0fabaa65846f565374d927adde4572b2cc1454b627dc53539f04e4ca1ee376cc
                                                                                                • Opcode Fuzzy Hash: bd34410cf5f0e04b6139ef16a1dbb7268584a3412f5b8a5678b3f645dfe224c7
                                                                                                • Instruction Fuzzy Hash: 4641B031A0420196C614FF75C956AAD3BA59B81708F00453FF809A72E6DF7C9A85C7CF
                                                                                                APIs
                                                                                                • _strlen.LIBCMT ref: 10001607
                                                                                                • _strcat.LIBCMT ref: 1000161D
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                • String ID:
                                                                                                • API String ID: 1922816806-0
                                                                                                • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                APIs
                                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$AttributesFilelstrcat
                                                                                                • String ID:
                                                                                                • API String ID: 3594823470-0
                                                                                                • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 00419FF2
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A006
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A013
                                                                                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,004196FD), ref: 0041A048
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A05A
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A05D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                • String ID:
                                                                                                • API String ID: 493672254-0
                                                                                                • Opcode ID: b1d06779e49364f5efd1e1156e42b495588f4c67c2645d9207e201a63b841c04
                                                                                                • Instruction ID: 3721d8981427c9c50277447f2eb78ca90bee9705940f35750f03ddb94c099399
                                                                                                • Opcode Fuzzy Hash: b1d06779e49364f5efd1e1156e42b495588f4c67c2645d9207e201a63b841c04
                                                                                                • Instruction Fuzzy Hash: 28016D315062107ED2111F349C0EEBF3E1CDF567B1F00022FF522A22D2DE69CE8981AA
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,0043800D,004379C1), ref: 00438024
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438032
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043804B
                                                                                                • SetLastError.KERNEL32(00000000,?,0043800D,004379C1), ref: 0043809D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 38d24d1e7ef4a0202574c8ec5187cf39076f8d2e51220313e93c30632868403e
                                                                                                • Instruction ID: c897193d57ecee64636fe05851fbd3cadc70b6e754ca2b2668497838eaebe06c
                                                                                                • Opcode Fuzzy Hash: 38d24d1e7ef4a0202574c8ec5187cf39076f8d2e51220313e93c30632868403e
                                                                                                • Instruction Fuzzy Hash: DC0190321083416DFB2823756C465377B68E709378F21123FF328515F1EF994C44514C
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                • _free.LIBCMT ref: 10005B2D
                                                                                                • _free.LIBCMT ref: 10005B55
                                                                                                • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                • _abort.LIBCMT ref: 10005B74
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$_abort
                                                                                                • String ID:
                                                                                                • API String ID: 3160817290-0
                                                                                                • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                • _free.LIBCMT ref: 00447106
                                                                                                • _free.LIBCMT ref: 0044712E
                                                                                                • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                • _abort.LIBCMT ref: 0044714D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$_abort
                                                                                                • String ID:
                                                                                                • API String ID: 3160817290-0
                                                                                                • Opcode ID: ae40a63e46beb22daa4956e078090859b5f7183b7e2bf3c5c9b8e84b2b7f2479
                                                                                                • Instruction ID: 03a1e9305cc52ab1e573739f72da4c843e3c1f7cd4612cbd08a2c6f68691a865
                                                                                                • Opcode Fuzzy Hash: ae40a63e46beb22daa4956e078090859b5f7183b7e2bf3c5c9b8e84b2b7f2479
                                                                                                • Instruction Fuzzy Hash: F2F0F931508B1027F612777A6C46E1B15269BC17B6B26002FF509A6392EF2C8C07911D
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E25
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E39
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E46
                                                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E55
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E67
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E6A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: f39116070f43c8ef762b87d05958f062f452bea97bf42776bddf3ff77cc24258
                                                                                                • Instruction ID: 47980c42e9b022aba05d73d81e1ae7aa31c0ed05cef52b60765f03c540efa169
                                                                                                • Opcode Fuzzy Hash: f39116070f43c8ef762b87d05958f062f452bea97bf42776bddf3ff77cc24258
                                                                                                • Instruction Fuzzy Hash: 44F062319003186BD611AB65DC89EBF3B6CDB45BA1F01002AF906A21D2DF78DD4A95F5
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419F8C
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FA0
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FAD
                                                                                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FBC
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FCE
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FD1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: 7777fcf707120254506fa4e92061de2525c9cf476e2c623219f1f225c16140d8
                                                                                                • Instruction ID: cbb6f8d25e78bf3f904679f952f169c6c08018e661e4ba535c0ca8fa304c3d8e
                                                                                                • Opcode Fuzzy Hash: 7777fcf707120254506fa4e92061de2525c9cf476e2c623219f1f225c16140d8
                                                                                                • Instruction Fuzzy Hash: 68F0C2315002147BD2116B24DC49EBF3A6CDB45BA1B01002AFA06A2192DF78CE4A85B8
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F27
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F3B
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F48
                                                                                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F57
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F69
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F6C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: c477b1fb9180f2e7e4f1d3c6d81281581987cb622c6cefb8769b920387ec4a4b
                                                                                                • Instruction ID: 95d7f5aa039a93820bb4883d7663946178ed8a5ec9cf590f88e81ba893971d89
                                                                                                • Opcode Fuzzy Hash: c477b1fb9180f2e7e4f1d3c6d81281581987cb622c6cefb8769b920387ec4a4b
                                                                                                • Instruction Fuzzy Hash: 7EF062715003147BD2116B65DC4AEBF3B6CDB45BA1B01002AFA06B2192DF78DD4A96B9
                                                                                                APIs
                                                                                                • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412AF5
                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412B24
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412BC5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Enum$InfoQueryValue
                                                                                                • String ID: [regsplt]$TG
                                                                                                • API String ID: 3554306468-170812940
                                                                                                • Opcode ID: 0d835acc4f187c4cdd0dff6ef6b5d5eb799cff61d686cea2efba78a8c152f0cf
                                                                                                • Instruction ID: eeb20da9b05a32976bf12a6402f5e40020a9f6991e42d7db5c0f7bae6a1218cc
                                                                                                • Opcode Fuzzy Hash: 0d835acc4f187c4cdd0dff6ef6b5d5eb799cff61d686cea2efba78a8c152f0cf
                                                                                                • Instruction Fuzzy Hash: C5511E72108345AED310EF61D985DEFB7ECEF84704F00492EB585D2191EB74EA088BAA
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                • __freea.LIBCMT ref: 100087D5
                                                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 2652629310-746054323
                                                                                                • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                  • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                  • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                  • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                  • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                • API String ID: 4036392271-1520055953
                                                                                                • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                APIs
                                                                                                  • Part of subcall function 0041265C: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0041267E
                                                                                                  • Part of subcall function 0041265C: RegQueryValueExW.ADVAPI32(?,0040E18D,00000000,00000000,?,00000400), ref: 0041269D
                                                                                                  • Part of subcall function 0041265C: RegCloseKey.ADVAPI32(?), ref: 004126A6
                                                                                                  • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                                                                                  • Part of subcall function 0041B366: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B37E
                                                                                                • _wcslen.LIBCMT ref: 0041AB01
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                                • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                                                                                • API String ID: 3286818993-4246244872
                                                                                                • Opcode ID: f96227f50e5d78c7b5b45e1ee0af5fe3d836a00b2a4c6991fda99104d0e8455f
                                                                                                • Instruction ID: 944f249e3467cd2310196e71108a033bc811508d99a3a404dc4e3305fa2889c9
                                                                                                • Opcode Fuzzy Hash: f96227f50e5d78c7b5b45e1ee0af5fe3d836a00b2a4c6991fda99104d0e8455f
                                                                                                • Instruction Fuzzy Hash: 8621A772B001042BDB04B6B58C96EFE366D9B84318B10087FF452B71D3EE3C9D554269
                                                                                                APIs
                                                                                                  • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                                                                                  • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                                                                                  • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                                  • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                                                                                  • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                                • String ID: [End of clipboard]$[Text copied to clipboard]$TmG$XmG
                                                                                                • API String ID: 2974294136-1855599884
                                                                                                • Opcode ID: 343e6e70a2ca78464240dbf5f91a0bb2bdbfb1c432b1d6801b65ad7a2fd0e3d6
                                                                                                • Instruction ID: 2623299308dd9d50029d580546b1e3590cd03a5acc49d0be8ee118f943746456
                                                                                                • Opcode Fuzzy Hash: 343e6e70a2ca78464240dbf5f91a0bb2bdbfb1c432b1d6801b65ad7a2fd0e3d6
                                                                                                • Instruction Fuzzy Hash: FB216131A102155ACB24FB65D8929EE7775AF54318F10403FF506772E2EF3C6E4A868D
                                                                                                APIs
                                                                                                • RegisterClassExA.USER32(00000030), ref: 0041CC77
                                                                                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CC92
                                                                                                • GetLastError.KERNEL32 ref: 0041CC9C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                • String ID: 0$MsgWindowClass
                                                                                                • API String ID: 2877667751-2410386613
                                                                                                • Opcode ID: 2bfcb1dee2ed81dd37ad325623522de50802513b554cdfc95296743f6fff5b81
                                                                                                • Instruction ID: c9edb97a89f7ec8dfbaa779d36c224b53f51aa00da94833f787b12e8c600820c
                                                                                                • Opcode Fuzzy Hash: 2bfcb1dee2ed81dd37ad325623522de50802513b554cdfc95296743f6fff5b81
                                                                                                • Instruction Fuzzy Hash: 2001E9B1D1021DAF8B00DF9ADCC49EFFBBDBE49355B50452AE414B6100EB708A458AA5
                                                                                                APIs
                                                                                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                                • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                                • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                                Strings
                                                                                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                                • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandle$CreateProcess
                                                                                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                • API String ID: 2922976086-4183131282
                                                                                                • Opcode ID: 76fab65495b0fd8f7af94722782b38f5ec20939b495d63d65361185c7f15ad50
                                                                                                • Instruction ID: 0865c4136dfbb59e32125d892e445ee09242962a1e3dc4bc305b740a121ed375
                                                                                                • Opcode Fuzzy Hash: 76fab65495b0fd8f7af94722782b38f5ec20939b495d63d65361185c7f15ad50
                                                                                                • Instruction Fuzzy Hash: 68F090B690029D7ACB20ABD69C0EECF7F3CEBC5B11F01046ABA04A2051DA706104CAB8
                                                                                                Strings
                                                                                                • Rmc-OH1QS4, xrefs: 0040693F
                                                                                                • C:\Users\user\Desktop\plugmancrypted.exe, xrefs: 00406927
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: C:\Users\user\Desktop\plugmancrypted.exe$Rmc-OH1QS4
                                                                                                • API String ID: 0-821181035
                                                                                                • Opcode ID: 440f994380ae97e7c47f4173536c55f38e93d9cb79c908ea235c8484f88855d2
                                                                                                • Instruction ID: ac3f053366391772af188fc274efb03f25e4c049f181d6a95d7665767018bac5
                                                                                                • Opcode Fuzzy Hash: 440f994380ae97e7c47f4173536c55f38e93d9cb79c908ea235c8484f88855d2
                                                                                                • Instruction Fuzzy Hash: 4FF0F6B17022109BDB103B34AD1966A3A45DB40346F01807BF98BFA6E2DF7C8851C68C
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044279A,?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002), ref: 00442809
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044281C
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,0044279A,?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 0044283F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: 263cd25904221f4c100099ecbb428eb8354416072efb1e7fc04c1483da550fa7
                                                                                                • Instruction ID: e557d05a47d06e8d32a7f66c2c4e22cdfb14d47a79db446b90f8ad9ee3cbc836
                                                                                                • Opcode Fuzzy Hash: 263cd25904221f4c100099ecbb428eb8354416072efb1e7fc04c1483da550fa7
                                                                                                • Instruction Fuzzy Hash: 8CF0A430900309FBDB119F94DD09B9EBFB4EB08753F4041B9F805A2261DF789D44CA98
                                                                                                APIs
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,004755B0,00414F47,00000000,00000000,00000001), ref: 00404AED
                                                                                                • SetEvent.KERNEL32(000002EC), ref: 00404AF9
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00404B04
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00404B0D
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                • String ID: KeepAlive | Disabled
                                                                                                • API String ID: 2993684571-305739064
                                                                                                • Opcode ID: 3ad55c3dc5f6f3fe6add9deac0dab9812a85fcbbdc7a8e47626d343f98173556
                                                                                                • Instruction ID: 7c4d48bbaa8a7164c3353f7df4ad5523490a6ea0f3ebe4e46dcacb08dafaa92a
                                                                                                • Opcode Fuzzy Hash: 3ad55c3dc5f6f3fe6add9deac0dab9812a85fcbbdc7a8e47626d343f98173556
                                                                                                • Instruction Fuzzy Hash: 31F096B19047007BDB1137759D0B66B7F58AB46325F00096FF492A26F2DE39D8508B5E
                                                                                                APIs
                                                                                                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041C10D), ref: 0041C084
                                                                                                • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041C10D), ref: 0041C091
                                                                                                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041C10D), ref: 0041C09E
                                                                                                • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041C10D), ref: 0041C0B1
                                                                                                Strings
                                                                                                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041C0A4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                • API String ID: 3024135584-2418719853
                                                                                                • Opcode ID: 1559ced9db44309d12e9096fc874ef99716f3117c459c374921cc59209bdbdc6
                                                                                                • Instruction ID: f27d36e20d2a67c690befc106ea5cafab99e09d075a2dfca7d32a9b7008c9529
                                                                                                • Opcode Fuzzy Hash: 1559ced9db44309d12e9096fc874ef99716f3117c459c374921cc59209bdbdc6
                                                                                                • Instruction Fuzzy Hash: 57E04F62604348BBD30037F6AC4EDAB3B7CE784617B10092AF612A01D3ED7484468B79
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProc
                                                                                                • String ID: GetCursorInfo$User32.dll$`#v
                                                                                                • API String ID: 1646373207-1032071883
                                                                                                • Opcode ID: 0df56b3ea47fb749bec4bd55cc4ccf0acac8e18c0c6121f5027aebd44438a81f
                                                                                                • Instruction ID: d22651b824a9dcc27ed8a3983426188770e59c2792dec55b339c490717ece8d0
                                                                                                • Opcode Fuzzy Hash: 0df56b3ea47fb749bec4bd55cc4ccf0acac8e18c0c6121f5027aebd44438a81f
                                                                                                • Instruction Fuzzy Hash: 54B09B705457459BC600DBE15C4D7143D14A544703B104069F04791151DE7450008F1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2a796732182faefe73add1043189caf6ca4f606f7631d49291716b08cb320153
                                                                                                • Instruction ID: 7c1105064789ab48ae90d42f937b6a9cbc34ac1ed42c20d541c6d1c3f1a57216
                                                                                                • Opcode Fuzzy Hash: 2a796732182faefe73add1043189caf6ca4f606f7631d49291716b08cb320153
                                                                                                • Instruction Fuzzy Hash: 7671D371900216AFEF20CF54C884ABFBB75EF45310F14422BEA15A7281DB788C61CFA9
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                                                                                  • Part of subcall function 0041B366: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B37E
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E799
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040E7BD
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E7CC
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E983
                                                                                                  • Part of subcall function 0041B392: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E5A8,00000000,?,?,004750FC), ref: 0041B3A7
                                                                                                  • Part of subcall function 0041B392: IsWow64Process.KERNEL32(00000000,?,?,?,004750FC), ref: 0041B3B2
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E974
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                • String ID:
                                                                                                • API String ID: 2180151492-0
                                                                                                • Opcode ID: b7bfe731ff17c58688fcd4c64187b547e3d7389649bb64e4d13ec06f7d566566
                                                                                                • Instruction ID: eccf11dc20c1a31a83cdfd33956dcb3d749eb3f266b118f2c15681f5292a9231
                                                                                                • Opcode Fuzzy Hash: b7bfe731ff17c58688fcd4c64187b547e3d7389649bb64e4d13ec06f7d566566
                                                                                                • Instruction Fuzzy Hash: F741CF311083455BC225FB61D891AEFB7E5AFA4304F50453EF849531E1EF389A49C65A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: c6d5326bb826bef7d4312f682f8fd03de73532d4ef60da68ba97a8c78ea7af64
                                                                                                • Instruction ID: 036c3dfb054a6f01566e3cd8d28730a68c174e79056a6e67996f15c63748089b
                                                                                                • Opcode Fuzzy Hash: c6d5326bb826bef7d4312f682f8fd03de73532d4ef60da68ba97a8c78ea7af64
                                                                                                • Instruction Fuzzy Hash: F341D636A002049FEB20DF79C881A5EB7B5FF88718F1545AEE915EB351DA35EE01CB84
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E5FD,?,00000000,?,00000001,?,?,00000001,0043E5FD,?), ref: 00450130
                                                                                                • __alloca_probe_16.LIBCMT ref: 00450168
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004501B9
                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00439BCF,?), ref: 004501CB
                                                                                                • __freea.LIBCMT ref: 004501D4
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                • String ID:
                                                                                                • API String ID: 313313983-0
                                                                                                • Opcode ID: daed02162d7f278869bfaea3c7a8f88d5c2a2d3218cc1490f903801f97ac0c2c
                                                                                                • Instruction ID: d7464a72994917abc30d80f71ec8451e4cba9cf5435b4dea42e63c5c2bdc5daf
                                                                                                • Opcode Fuzzy Hash: daed02162d7f278869bfaea3c7a8f88d5c2a2d3218cc1490f903801f97ac0c2c
                                                                                                • Instruction Fuzzy Hash: 9631E132A0060AABDF249F65DC41DAF7BA5EB00311F05416AFC04E7252EB3ACD54CBA5
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                • _free.LIBCMT ref: 100071B8
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                • String ID:
                                                                                                • API String ID: 336800556-0
                                                                                                • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0044E354
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E377
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E39D
                                                                                                • _free.LIBCMT ref: 0044E3B0
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E3BF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                • String ID:
                                                                                                • API String ID: 336800556-0
                                                                                                • Opcode ID: 1d4758ed0160ac471983c8ffd3a0470c3cf8fd4ea00c3cafbe93e28275fbbba9
                                                                                                • Instruction ID: 5f1b7bba735f2dc00ee4e6ee14e94985e19ed078b50b1d1b699098eccd63c47a
                                                                                                • Opcode Fuzzy Hash: 1d4758ed0160ac471983c8ffd3a0470c3cf8fd4ea00c3cafbe93e28275fbbba9
                                                                                                • Instruction Fuzzy Hash: D50171726017157F73221A776C88C7B6A6DEAC2F65315012EFD05D3241DE698C0291B9
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                • _free.LIBCMT ref: 10005BB4
                                                                                                • _free.LIBCMT ref: 10005BDB
                                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445569,00440CA8,00000000,?,?,?,?,00440E8B,00000000,0000000A,000000FF,0000000A,00000000), ref: 00447158
                                                                                                • _free.LIBCMT ref: 0044718D
                                                                                                • _free.LIBCMT ref: 004471B4
                                                                                                • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 004471C1
                                                                                                • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 004471CA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: c73b76ca02ce190c9082a6036dde6ca48763b4b9e088bcde2ec0a65c3a46cc10
                                                                                                • Instruction ID: 9627307c59aa3692a64de8377ee3c20019e30fe80ec8d82769d3f9bfdfbdb6fb
                                                                                                • Opcode Fuzzy Hash: c73b76ca02ce190c9082a6036dde6ca48763b4b9e088bcde2ec0a65c3a46cc10
                                                                                                • Instruction Fuzzy Hash: 3E01F97624CB102BB30267B95C85D2B2A29DBC17B6726012FF509A6392EF2C8C07515D
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                                                                                • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B5D3
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B5DE
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B5E6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseHandleOpen$FileImageName
                                                                                                • String ID:
                                                                                                • API String ID: 2951400881-0
                                                                                                • Opcode ID: ef8d0d82becda269430901369212c52b3606b15fcf963f3a122b886808132bbc
                                                                                                • Instruction ID: 5d23c8c1f4703883972a4236376900cac23e2486f01e1b2fafccabe2f4d6955e
                                                                                                • Opcode Fuzzy Hash: ef8d0d82becda269430901369212c52b3606b15fcf963f3a122b886808132bbc
                                                                                                • Instruction Fuzzy Hash: D5F049712003167BD31167558C4AFABB66ECF40B9AF01002BF611E21A2EF74DDC146BD
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$lstrcat
                                                                                                • String ID:
                                                                                                • API String ID: 493641738-0
                                                                                                • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 100091D0
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 100091E2
                                                                                                • _free.LIBCMT ref: 100091F4
                                                                                                • _free.LIBCMT ref: 10009206
                                                                                                • _free.LIBCMT ref: 10009218
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 0044F9C5
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 0044F9D7
                                                                                                • _free.LIBCMT ref: 0044F9E9
                                                                                                • _free.LIBCMT ref: 0044F9FB
                                                                                                • _free.LIBCMT ref: 0044FA0D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 8a0a0e5e94a0327d1776c165067cf9b9603f8d21362122b3839296c578ae3d6e
                                                                                                • Instruction ID: 2de1f51a18cc7960585f1cc37bbb46b0208bdbaa703fd0d38dd13c161260ee8b
                                                                                                • Opcode Fuzzy Hash: 8a0a0e5e94a0327d1776c165067cf9b9603f8d21362122b3839296c578ae3d6e
                                                                                                • Instruction Fuzzy Hash: B5F012725042107BA620DF59FAC6D1773E9EA457247A5482BF18DEBA51C738FCC0865C
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 1000536F
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 10005381
                                                                                                • _free.LIBCMT ref: 10005394
                                                                                                • _free.LIBCMT ref: 100053A5
                                                                                                • _free.LIBCMT ref: 100053B6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00443515
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 00443527
                                                                                                • _free.LIBCMT ref: 0044353A
                                                                                                • _free.LIBCMT ref: 0044354B
                                                                                                • _free.LIBCMT ref: 0044355C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 5455ce8706e3ca66a7bad791c73c4693f29d9b457f563819123ce72749b06e66
                                                                                                • Instruction ID: bf08c2b723e6da78e2f9a692d3f9dcffc94df7bb1312aea5ebb3a1bf48e2a6b8
                                                                                                • Opcode Fuzzy Hash: 5455ce8706e3ca66a7bad791c73c4693f29d9b457f563819123ce72749b06e66
                                                                                                • Instruction Fuzzy Hash: 4EF0FEB08011219FD726AF69BE414063BA0F709764346113BF45E66B71E7790982EB8E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 0-746054323
                                                                                                • Opcode ID: a6e3e212e3e8e69e5b3e90cc56111543990103d41b7ff965f9c36c1ca3af5bcd
                                                                                                • Instruction ID: e0f187942aa90d3f3c40e731aaf8e1dc3f9218b11d74515a16622edea155382f
                                                                                                • Opcode Fuzzy Hash: a6e3e212e3e8e69e5b3e90cc56111543990103d41b7ff965f9c36c1ca3af5bcd
                                                                                                • Instruction Fuzzy Hash: C8519F75D0020AABFB11CFA4CD45FAE7BF9EF493A0F11405AF805A7299D731AA41CB61
                                                                                                APIs
                                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0041694E
                                                                                                • GetWindowTextW.USER32(?,?,0000012C), ref: 00416980
                                                                                                • IsWindowVisible.USER32(?), ref: 00416987
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                • String ID: 0VG
                                                                                                • API String ID: 3142014140-3748860515
                                                                                                • Opcode ID: 7dffa6db441de4e2d8a8c93362c098c3c8b11f0706978821fbcecf492f2762f5
                                                                                                • Instruction ID: a92d2c2722018a5f2df8734f3a85bf91d45912e01cb50305def5a483f7f9536a
                                                                                                • Opcode Fuzzy Hash: 7dffa6db441de4e2d8a8c93362c098c3c8b11f0706978821fbcecf492f2762f5
                                                                                                • Instruction Fuzzy Hash: FE71C3311082415AC335FB61D8A5ADFB3E4EFD4308F50493EB58A530E1EF74AA49CB9A
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 1000655C
                                                                                                  • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                                                  • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                  • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                • String ID: *?$.$|/Hn/
                                                                                                • API String ID: 2667617558-3735783567
                                                                                                • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                APIs
                                                                                                • _strpbrk.LIBCMT ref: 0044D6B8
                                                                                                • _free.LIBCMT ref: 0044D7D5
                                                                                                  • Part of subcall function 0043AA64: IsProcessorFeaturePresent.KERNEL32(00000017,0043AA36,00000000,0000000A,0000000A,00000000,0041AF72,00000022,?,?,0043AA43,00000000,00000000,00000000,00000000,00000000), ref: 0043AA66
                                                                                                  • Part of subcall function 0043AA64: GetCurrentProcess.KERNEL32(C0000417,0000000A,00000000), ref: 0043AA88
                                                                                                  • Part of subcall function 0043AA64: TerminateProcess.KERNEL32(00000000), ref: 0043AA8F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                • String ID: *?$.
                                                                                                • API String ID: 2812119850-3972193922
                                                                                                • Opcode ID: a944b580e8880c8e130e00bdfc146e92b9e44dab990486ab21efc68c0a65a633
                                                                                                • Instruction ID: 04f9c45711fae47bd805a28d6c684d852fff3551aaaea8338e0504d4b1d9eb7e
                                                                                                • Opcode Fuzzy Hash: a944b580e8880c8e130e00bdfc146e92b9e44dab990486ab21efc68c0a65a633
                                                                                                • Instruction Fuzzy Hash: C251B175E00209AFEF14DFA9C881AAEBBB5EF58314F25416FE854E7301E6399E01CB54
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\plugmancrypted.exe,00000104), ref: 10004C1D
                                                                                                • _free.LIBCMT ref: 10004CE8
                                                                                                • _free.LIBCMT ref: 10004CF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: C:\Users\user\Desktop\plugmancrypted.exe
                                                                                                • API String ID: 2506810119-939088702
                                                                                                • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\plugmancrypted.exe,00000104), ref: 00442924
                                                                                                • _free.LIBCMT ref: 004429EF
                                                                                                • _free.LIBCMT ref: 004429F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: C:\Users\user\Desktop\plugmancrypted.exe
                                                                                                • API String ID: 2506810119-939088702
                                                                                                • Opcode ID: e43589620df6d0a02bbe9fe69612e96b807286bf84d647a6e2c91bfdc5f7fdb4
                                                                                                • Instruction ID: 08a660f2d8e46f51ee0862092f41265a48d7a3eaa7bec75f040af8368b354bfd
                                                                                                • Opcode Fuzzy Hash: e43589620df6d0a02bbe9fe69612e96b807286bf84d647a6e2c91bfdc5f7fdb4
                                                                                                • Instruction Fuzzy Hash: E53193B1A00258AFEB21DF999E8199EBBBCEB85314F50406BF805A7311D6F84A41CB59
                                                                                                APIs
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,?,00000000,?,?,10009C54,?,00000000,?), ref: 100099A8
                                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,10009C54,?,00000000,?,00000000,00000000,?,00000000), ref: 100099D6
                                                                                                • GetLastError.KERNEL32(?,10009C54,?,00000000,?,00000000,00000000,?,00000000), ref: 10009A07
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 2456169464-746054323
                                                                                                • Opcode ID: 427868bedf5aeb2dbe74816aae85c58cffe3606ac2297d0d696d101185ff0d15
                                                                                                • Instruction ID: 4dca0cb6e5ae08cfaecef52c11f05f5c50a0db4386d341a895ff8b0f45518e07
                                                                                                • Opcode Fuzzy Hash: 427868bedf5aeb2dbe74816aae85c58cffe3606ac2297d0d696d101185ff0d15
                                                                                                • Instruction Fuzzy Hash: 7D314375A002199FEB14CF69CC95AEAB7B9EF48344F0144ADE50AD7254D730AD81CB61
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                  • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00466324), ref: 004178B2
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32($cF,?,?,00403AB9,00466324), ref: 004178BB
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • Sleep.KERNEL32(000000FA,00466324), ref: 00403AFC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                • API String ID: 368326130-3219657780
                                                                                                • Opcode ID: 85159cc251287dd177caeb332e76cd030cc05a9551222dabf935cb44dea42ff3
                                                                                                • Instruction ID: 03df4c4d2d4284c33795d9a7a6d048d6c9d09091ba23d5cef523323604a75e49
                                                                                                • Opcode Fuzzy Hash: 85159cc251287dd177caeb332e76cd030cc05a9551222dabf935cb44dea42ff3
                                                                                                • Instruction Fuzzy Hash: 88319531A0011456CB14FB76DC969EE7779AF80318F00007FF906B31D2EF385A4AC699
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                • wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventLocalTimewsprintf
                                                                                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                • API String ID: 1497725170-1359877963
                                                                                                • Opcode ID: a4fe7936178319c407b82c9f37e4bb1b540b20e4605a46eceb746eb1e7cc4169
                                                                                                • Instruction ID: eacaba0d290b76b22f399a57737f65b18f8a023abca8575ba11697f47f6457b1
                                                                                                • Opcode Fuzzy Hash: a4fe7936178319c407b82c9f37e4bb1b540b20e4605a46eceb746eb1e7cc4169
                                                                                                • Instruction Fuzzy Hash: F1115172500118AACB18FB96EC56CFF77B8AE48715B00013FF542621D1EF7C5A86C6E9
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateThread$LocalTime$wsprintf
                                                                                                • String ID: Online Keylogger Started
                                                                                                • API String ID: 112202259-1258561607
                                                                                                • Opcode ID: 320e1534e14afb6a11f820e309b6c359e077f30e295385c34cd15f9b31ca3aa7
                                                                                                • Instruction ID: 13545b77b67cc4507d33d8d8c8ff512a749ba16b8a43449315e0da64450a8124
                                                                                                • Opcode Fuzzy Hash: 320e1534e14afb6a11f820e309b6c359e077f30e295385c34cd15f9b31ca3aa7
                                                                                                • Instruction Fuzzy Hash: E80161A1A003193AE62076768C86DBF7A6DCA813A8F41043EF541662C3EA7D5D5582FA
                                                                                                APIs
                                                                                                • CloseHandle.KERNEL32(00000000,00000000,8@,?,0044ABA1,8@,0046ED38,0000000C), ref: 0044ACD9
                                                                                                • GetLastError.KERNEL32(?,0044ABA1,8@,0046ED38,0000000C), ref: 0044ACE3
                                                                                                • __dosmaperr.LIBCMT ref: 0044AD0E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                • String ID: 8@
                                                                                                • API String ID: 2583163307-819625340
                                                                                                • Opcode ID: f11388ad4d481d826d75519938a9a20661ac3afaecb278e3b0e3570ed3326013
                                                                                                • Instruction ID: 727ae4bd5dc399200e14d16721253afac520870d53d00e52bc8525c117eb1139
                                                                                                • Opcode Fuzzy Hash: f11388ad4d481d826d75519938a9a20661ac3afaecb278e3b0e3570ed3326013
                                                                                                • Instruction Fuzzy Hash: 6F018836640A100BF3212634688573F67498B91B39F29022FF804872D2CE2D8CC1919F
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEventHandleObjectSingleWait
                                                                                                • String ID: Connection Timeout
                                                                                                • API String ID: 2055531096-499159329
                                                                                                • Opcode ID: c9db23556e7a5907e98359d8e762215bf5c4cc9c90218e9daab605252b7cd890
                                                                                                • Instruction ID: 3c9b6871d48b6b3111a672927d5bafc1cfd46058a166b60e959a8cf6be3f516d
                                                                                                • Opcode Fuzzy Hash: c9db23556e7a5907e98359d8e762215bf5c4cc9c90218e9daab605252b7cd890
                                                                                                • Instruction Fuzzy Hash: 1601F5B1900B41AFD325BB3A8C4255ABFE4AB45315740053FE293A2BA2DE38E440CB5E
                                                                                                APIs
                                                                                                • RegCreateKeyW.ADVAPI32(80000001,00000000,004752F0), ref: 00412857
                                                                                                • RegSetValueExW.ADVAPI32(004752F0,?,00000000,00000001,00000000,00000000,00475308,?,0040E6A3,pth_unenc,004752F0), ref: 00412885
                                                                                                • RegCloseKey.ADVAPI32(004752F0,?,0040E6A3,pth_unenc,004752F0), ref: 00412890
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 1818849710-4028850238
                                                                                                • Opcode ID: 2b72839c34b3cecad4a9efae9834add99ea03f9564e8004151796020c5cf8ad5
                                                                                                • Instruction ID: ab464752906d06cf6e422ab9fb9c42b8cedad3247386a7cb387aa37f92243dc4
                                                                                                • Opcode Fuzzy Hash: 2b72839c34b3cecad4a9efae9834add99ea03f9564e8004151796020c5cf8ad5
                                                                                                • Instruction Fuzzy Hash: 2DF09071500218BBDF50AFA0EE46FEE376CEF40B55F10452AF902B60A1EF75DA08DA94
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040CE9C
                                                                                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CEDB
                                                                                                  • Part of subcall function 004349CD: _Yarn.LIBCPMT ref: 004349EC
                                                                                                  • Part of subcall function 004349CD: _Yarn.LIBCPMT ref: 00434A10
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CEFF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                • String ID: bad locale name
                                                                                                • API String ID: 3628047217-1405518554
                                                                                                • Opcode ID: 010949cb006bc602daa897d098c336462d98aae1940c118575e4f0b09407aa79
                                                                                                • Instruction ID: d3fe92e39fe1a76843bdcbebe92e6b3b15f8dcb0f99b50ce5c9cc2ba4b618b17
                                                                                                • Opcode Fuzzy Hash: 010949cb006bc602daa897d098c336462d98aae1940c118575e4f0b09407aa79
                                                                                                • Instruction Fuzzy Hash: FEF03171004214AAC768FB62D853ADE77A4AF14758F504B3FF046224D2AF7CB619C688
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041538C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExecuteShell
                                                                                                • String ID: /C $cmd.exe$open
                                                                                                • API String ID: 587946157-3896048727
                                                                                                • Opcode ID: b799db65b19b64ea83398d7d6a480beb53c0bbc67eac42254a732b9a5fcca3ea
                                                                                                • Instruction ID: 200bce0b0309f38ec9064e519a9a4578f5a600b3ca3b701a036ea6d1077247ba
                                                                                                • Opcode Fuzzy Hash: b799db65b19b64ea83398d7d6a480beb53c0bbc67eac42254a732b9a5fcca3ea
                                                                                                • Instruction Fuzzy Hash: F1E0C0B11043406AC708FB65DC96DBF77AC9A90749F10483FB582621E2EE78A949865E
                                                                                                APIs
                                                                                                • TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                                                                                • UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                                                                                • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: TerminateThread$HookUnhookWindows
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 3123878439-4028850238
                                                                                                • Opcode ID: 5ce168509fd4f53ac483e5472d8910f69c83d539265d002f33f874c0df2e9344
                                                                                                • Instruction ID: 19faee7e247875c6ed4f8509c992ad96cda0262a64c11258bcf204109443e34b
                                                                                                • Opcode Fuzzy Hash: 5ce168509fd4f53ac483e5472d8910f69c83d539265d002f33f874c0df2e9344
                                                                                                • Instruction Fuzzy Hash: BEE01DB1245715DFD3101F545C94825BB99EB44746324087FF6C165252CD798C14C759
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetLastInputInfo$User32.dll
                                                                                                • API String ID: 2574300362-1519888992
                                                                                                • Opcode ID: dda8da8e992a33b18976b493c6326eaa7f3d62003a83836ab2f58572c3d9c97a
                                                                                                • Instruction ID: 0ec815453ed4bd5b2a0753acad69ff197eebc14e76dec883dd33c8fab126b773
                                                                                                • Opcode Fuzzy Hash: dda8da8e992a33b18976b493c6326eaa7f3d62003a83836ab2f58572c3d9c97a
                                                                                                • Instruction Fuzzy Hash: EDB092B19827449FC7006BE0AD8DA263A64B654B43729006BF04BE51A1EEB890009A1F
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __alldvrm$_strrchr
                                                                                                • String ID:
                                                                                                • API String ID: 1036877536-0
                                                                                                • Opcode ID: af13233f64bff1d952fd16752439a8415c6481e4108584e155c4282d62de78f9
                                                                                                • Instruction ID: 0b1f6a9dfc50a2d3a5cef35921af3bd2f2baba9a31ad448e356136b6fbdd55d0
                                                                                                • Opcode Fuzzy Hash: af13233f64bff1d952fd16752439a8415c6481e4108584e155c4282d62de78f9
                                                                                                • Instruction Fuzzy Hash: 3AA14532A042869FFB258E18C8817AFBBA1EF15354F1841AFE8859B382C67C8D41D758
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 74ece5ab94bf9e1454a637eee9e3d981c9d933d52cb43566ce5b815ebd6edde4
                                                                                                • Instruction ID: 0bd1fcef5d7791e57e96aa6a4775832058b0444fd7bffa6098b49987863132bf
                                                                                                • Opcode Fuzzy Hash: 74ece5ab94bf9e1454a637eee9e3d981c9d933d52cb43566ce5b815ebd6edde4
                                                                                                • Instruction Fuzzy Hash: 64415D31900F00ABEF227AB98C9667F3A75DF01775F14411FFC1896293D63C890986AA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 06f5741e10c63ae8bf02417847894b944428abddfdd2a378d9b946abe0f64cd5
                                                                                                • Instruction ID: 88518833c1d7008d36d723bd78668d328a40e80baed6ee8e3f57c0ed0377fbed
                                                                                                • Opcode Fuzzy Hash: 06f5741e10c63ae8bf02417847894b944428abddfdd2a378d9b946abe0f64cd5
                                                                                                • Instruction Fuzzy Hash: FE413AB1A00704BFE7249F39CC41BAABBA8EB84718F10412FF405DB291D379A9418788
                                                                                                APIs
                                                                                                Strings
                                                                                                • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                                • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                • API String ID: 3472027048-1236744412
                                                                                                • Opcode ID: 2d94ec45325e11c7aa52fedc247daf944a635b981d474f73b3796ebacd57df47
                                                                                                • Instruction ID: 247d09dce9e3c977c7e86e48a76dae703d52755688f8fe644b587970fcea700c
                                                                                                • Opcode Fuzzy Hash: 2d94ec45325e11c7aa52fedc247daf944a635b981d474f73b3796ebacd57df47
                                                                                                • Instruction Fuzzy Hash: FE31A81124C38069CA117B7514167AB6F958A93754F08847FE8C4273E3DB7A480883EF
                                                                                                APIs
                                                                                                • EnumDisplayMonitors.USER32(00000000,00000000,004188F2,00000000), ref: 00418818
                                                                                                • EnumDisplayDevicesW.USER32(?), ref: 00418848
                                                                                                • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004188BD
                                                                                                • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004188DA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DisplayEnum$Devices$Monitors
                                                                                                • String ID:
                                                                                                • API String ID: 1432082543-0
                                                                                                • Opcode ID: f521dafb0295dc45c8c38bceff4b7bff5c3c9c28471fb5873da2cd52b0f48c87
                                                                                                • Instruction ID: 8a998fcd3466a1ac5c09a6ba9f6cc31f14a3926adb32c7c165c8f26c3d999b60
                                                                                                • Opcode Fuzzy Hash: f521dafb0295dc45c8c38bceff4b7bff5c3c9c28471fb5873da2cd52b0f48c87
                                                                                                • Instruction Fuzzy Hash: 952180721043046BD320EB16DC85EABBBECEFD1754F00053EB449D2191EB78AA49C6A6
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SystemTimes$Sleep__aulldiv
                                                                                                • String ID:
                                                                                                • API String ID: 188215759-0
                                                                                                • Opcode ID: a7e496ea74412c4f74dd561fc1d9e5efe2a930fde01781876ab294e7da94f75c
                                                                                                • Instruction ID: 7cb4eddd506215a21d9c44be4850b318e12e80d273729b61be08d6c7a3dfdc1e
                                                                                                • Opcode Fuzzy Hash: a7e496ea74412c4f74dd561fc1d9e5efe2a930fde01781876ab294e7da94f75c
                                                                                                • Instruction Fuzzy Hash: 9A216D725043009FC304EF65D9858AFB7E8EFC8714F044A2EF58593251EA38EA49CBA7
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B8F1: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B901
                                                                                                  • Part of subcall function 0041B8F1: GetWindowTextLengthW.USER32(00000000), ref: 0041B90A
                                                                                                  • Part of subcall function 0041B8F1: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B934
                                                                                                • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                                • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$SleepText$ForegroundLength
                                                                                                • String ID: [ $ ]
                                                                                                • API String ID: 3309952895-93608704
                                                                                                • Opcode ID: a49d20d3ecb8acddbd4132256805943c56c930b2d695a3c4727dac55219dcbc1
                                                                                                • Instruction ID: 7bed66d096a43dd94c2219bc8d3cdd3a5a7df98386a17a5ae9bf36b343ab91a8
                                                                                                • Opcode Fuzzy Hash: a49d20d3ecb8acddbd4132256805943c56c930b2d695a3c4727dac55219dcbc1
                                                                                                • Instruction Fuzzy Hash: AF119F315042009BD218BB26DC17AAEBBA8AF41708F40047FF542621D3EF79AA1986DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0179cd47eff8c75336d676f059f6bc7958f0419c29ca715f1c911511461a8d64
                                                                                                • Instruction ID: b58c8eca075ef28bddc965f0bc4d2171c3ec1f8ef65ef5096018edf4bb449d44
                                                                                                • Opcode Fuzzy Hash: 0179cd47eff8c75336d676f059f6bc7958f0419c29ca715f1c911511461a8d64
                                                                                                • Instruction Fuzzy Hash: 2501F2B26093163EF61016796CC1F27671CEF417B8BB1032BB626612D2EEA88C46606D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 112e7316d96929b625426bf143e83baabee3255260599eba4999be5de9cde10c
                                                                                                • Instruction ID: 7fe3e8edc5bbc175eb6928fc2517c3e9b6b95ea9c4057c88a91cd5d3c4beb3ed
                                                                                                • Opcode Fuzzy Hash: 112e7316d96929b625426bf143e83baabee3255260599eba4999be5de9cde10c
                                                                                                • Instruction Fuzzy Hash: F201F9B22096167EB61016796DC4D27676DEF813B83F1033BF421612D1EEA8CC44A179
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043831F
                                                                                                  • Part of subcall function 0043826C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043829B
                                                                                                  • Part of subcall function 0043826C: ___AdjustPointer.LIBCMT ref: 004382B6
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 00438334
                                                                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438345
                                                                                                • CallCatchBlock.LIBVCRUNTIME ref: 0043836D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                • String ID:
                                                                                                • API String ID: 737400349-0
                                                                                                • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                • Instruction ID: 0bcd00d322a0ad7a372b2cc4a74953bc209b0d499cbe7a3061e5fba3b10c2df3
                                                                                                • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                • Instruction Fuzzy Hash: 3E014072100248BBDF126E96CC41DEF7B69EF4C758F04501DFE4866221D73AE861DBA4
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue), ref: 00447452
                                                                                                • GetLastError.KERNEL32(?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue,0045E328,FlsSetValue,00000000,00000364,?,004471A1), ref: 0044745E
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue,0045E328,FlsSetValue,00000000), ref: 0044746C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: bca6965db1f65f3d9859255c05e5b0128703451981dee5a4eba808798ce175cf
                                                                                                • Instruction ID: 55721a836d87515a1eea2a56d4c7bce34062b93f94d6470a2cb527c4f3a692dc
                                                                                                • Opcode Fuzzy Hash: bca6965db1f65f3d9859255c05e5b0128703451981dee5a4eba808798ce175cf
                                                                                                • Instruction Fuzzy Hash: 6D01FC326497366BD7314F789C44A777FD8AF047617114535F906E3241DF28D802C6E8
                                                                                                APIs
                                                                                                • GetSystemMetrics.USER32(0000004C), ref: 0041870F
                                                                                                • GetSystemMetrics.USER32(0000004D), ref: 00418715
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 0041871B
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 00418721
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem
                                                                                                • String ID:
                                                                                                • API String ID: 4116985748-0
                                                                                                • Opcode ID: 0409876626ed8831e64dc81abc3b09ac1b97839c455807a5cfaaf12ce600e90b
                                                                                                • Instruction ID: 0d34e4fe417a410293abd419840fb627d3fd172a5f9f2d4f3f0ee0adad43daa0
                                                                                                • Opcode Fuzzy Hash: 0409876626ed8831e64dc81abc3b09ac1b97839c455807a5cfaaf12ce600e90b
                                                                                                • Instruction Fuzzy Hash: 26F0D672B043215BCB00AB754C4596EBB969FC03A4F25083FFA159B381EE78EC4687D9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memcmp
                                                                                                • String ID: <kG$<kG
                                                                                                • API String ID: 2931989736-383723866
                                                                                                • Opcode ID: 21e918851be83e46baa3e5e3c8b8b30cd909724b045746f3163941703dd33272
                                                                                                • Instruction ID: 841d78c923fca9e627808cf77cab3bf97fcfd39527adbe47470f5cf9fadca134
                                                                                                • Opcode Fuzzy Hash: 21e918851be83e46baa3e5e3c8b8b30cd909724b045746f3163941703dd33272
                                                                                                • Instruction Fuzzy Hash: 9F613471604B0A9ED710DF28D8806A6B7A5FF18304F440A3FEC5CCF656E3B8A955C7A9
                                                                                                APIs
                                                                                                  • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                                                                                                • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CodeInfoPageValid
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 546120528-746054323
                                                                                                • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                                                                                                • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                                                                                                APIs
                                                                                                • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                  • Part of subcall function 004041F1: socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 0040428C: connect.WS2_32(?,00C59578,00000010), ref: 004042A5
                                                                                                  • Part of subcall function 0041B8B5: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041B8CA
                                                                                                  • Part of subcall function 00404468: send.WS2_32(000002E4,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                • String ID: pQG$NG
                                                                                                • API String ID: 2334542088-921107917
                                                                                                • Opcode ID: 93417b618a3402586737eca50938bba079e3658c9980c6ae3a3b34b70587aa4a
                                                                                                • Instruction ID: 713adcd63a50277e86c853b9c7bd1a900ae8bd87492a3ad9f31fb308660c5d8e
                                                                                                • Opcode Fuzzy Hash: 93417b618a3402586737eca50938bba079e3658c9980c6ae3a3b34b70587aa4a
                                                                                                • Instruction Fuzzy Hash: BB5141321082405AC365F775D8A2AEF73E5AFD4308F50483FF84A671E2EE789949C69D
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Info
                                                                                                • String ID: $|/Hn/
                                                                                                • API String ID: 1807457897-616150124
                                                                                                • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                                                                                                • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DD69
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Info
                                                                                                • String ID: $vD
                                                                                                • API String ID: 1807457897-3636070802
                                                                                                • Opcode ID: af2dbb740455362532db4c6e27cef1bba8ecc5757f530743f693fef6f10ca257
                                                                                                • Instruction ID: 6a53932102cf2f29093c464eb4c67803ff3648b28b3ba8b7d074bec3f8911faa
                                                                                                • Opcode Fuzzy Hash: af2dbb740455362532db4c6e27cef1bba8ecc5757f530743f693fef6f10ca257
                                                                                                • Instruction Fuzzy Hash: D0415DB0D047489BEF218E24CC84AF6BBF9DF55708F2404EEE58A87142D239AD45DF65
                                                                                                APIs
                                                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417DFE
                                                                                                  • Part of subcall function 00417988: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417E11,00000000,?,?,?,?,00000000), ref: 0041799C
                                                                                                • SHCreateMemStream.SHLWAPI(00000000), ref: 00417E4B
                                                                                                  • Part of subcall function 004179FB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417E67,00000000,?,?), ref: 00417A0D
                                                                                                  • Part of subcall function 004179AB: GdipDisposeImage.GDIPLUS(?,00417EC2), ref: 004179B4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                • String ID: image/jpeg
                                                                                                • API String ID: 1291196975-3785015651
                                                                                                • Opcode ID: e1bf99cfe177926dfb30438cad3e48319a95351c55285f46e9bc63fa7091f753
                                                                                                • Instruction ID: 8af81f403c9bc23e7458ee74b157d237c4b9220e470ad7f048828f44144df9d5
                                                                                                • Opcode Fuzzy Hash: e1bf99cfe177926dfb30438cad3e48319a95351c55285f46e9bc63fa7091f753
                                                                                                • Instruction Fuzzy Hash: 23313C71518204AFC301EF65C884DAFB7E9EF8A704F000A6EF98597251DB79D9098BA6
                                                                                                APIs
                                                                                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450D49,?,00000050,?,?,?,?,?), ref: 00450BC9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 0-711371036
                                                                                                • Opcode ID: 6fd782f53c9633299fe98566c4ec68ed2bffd726811d49864d22e4fe4dac6dcd
                                                                                                • Instruction ID: d29bb87f3b47b124c8bd6c760bb86eb4cd4ec0f84f402c6b2e0ab732353f73f5
                                                                                                • Opcode Fuzzy Hash: 6fd782f53c9633299fe98566c4ec68ed2bffd726811d49864d22e4fe4dac6dcd
                                                                                                • Instruction Fuzzy Hash: 4021F72AA00105A6E7308FD48C82B977396AB50B1BF564467ED09D7303F73AFD09C358
                                                                                                APIs
                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,10009C44,?,00000000,?,00000000,00000000), ref: 100098B1
                                                                                                • GetLastError.KERNEL32(?,10009C44,?,00000000,?,00000000,00000000,?,00000000), ref: 100098DA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastWrite
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 442123175-746054323
                                                                                                • Opcode ID: 44c02fc31167cef82eb2c7325f1918f2fa4c78e7bb82f98d2e24cadcd22c2269
                                                                                                • Instruction ID: 10ae1692938ef1c10bc5cabf9f53a2a3bd6999d6216ca289fae0ab6df1a73c16
                                                                                                • Opcode Fuzzy Hash: 44c02fc31167cef82eb2c7325f1918f2fa4c78e7bb82f98d2e24cadcd22c2269
                                                                                                • Instruction Fuzzy Hash: 94316171A002199BDB24CF59CC80AD9B3F9FF49350F2185AAE519D7360DB30E985CB50
                                                                                                APIs
                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,10009C64,?,00000000,?,00000000,00000000), ref: 100097C3
                                                                                                • GetLastError.KERNEL32(?,10009C64,?,00000000,?,00000000,00000000,?,00000000), ref: 100097EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastWrite
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 442123175-746054323
                                                                                                • Opcode ID: 2f97b0ea3d2111d9094b6cf8e2123f0946c90a3f737484b600376bf3188e4d44
                                                                                                • Instruction ID: 38868272ab1662a5a2ad023a6230b7ecc66e9b3593444bcc3211b27e9ed8cf09
                                                                                                • Opcode Fuzzy Hash: 2f97b0ea3d2111d9094b6cf8e2123f0946c90a3f737484b600376bf3188e4d44
                                                                                                • Instruction Fuzzy Hash: DC21B136A14219DFEB15CF59C884BDAB3F8EB48381F1044AAE94AD7251D730ED81CB20
                                                                                                APIs
                                                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417EEA
                                                                                                  • Part of subcall function 00417988: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417E11,00000000,?,?,?,?,00000000), ref: 0041799C
                                                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417F0F
                                                                                                  • Part of subcall function 004179FB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417E67,00000000,?,?), ref: 00417A0D
                                                                                                  • Part of subcall function 004179AB: GdipDisposeImage.GDIPLUS(?,00417EC2), ref: 004179B4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                • String ID: image/png
                                                                                                • API String ID: 1291196975-2966254431
                                                                                                • Opcode ID: 053f6287f7d965cb7f0bac2638c547cbf4955c36911a47581fa7b8d062986c86
                                                                                                • Instruction ID: ee77ca1c213fe0bce41e511bbcee913114c194eb695e7cc9890245c9a4d1a3c2
                                                                                                • Opcode Fuzzy Hash: 053f6287f7d965cb7f0bac2638c547cbf4955c36911a47581fa7b8d062986c86
                                                                                                • Instruction Fuzzy Hash: B9219F71204210AFC301AB61CC88DBFBBBDEFCA714B00052EF94693261DB389945CBA6
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,00474EE0,004755B0,?,?,?,?,?,?,?,00414F0F,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • GetLocalTime.KERNEL32(?,00474EE0,004755B0,?,?,?,?,?,?,?,00414F0F,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                                Strings
                                                                                                • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime
                                                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                                                • API String ID: 481472006-1507639952
                                                                                                • Opcode ID: c0ee731de2a7eb3f0a64fa7099e26221a36f7baf9762917c7dc1a7a0b59df7e7
                                                                                                • Instruction ID: 07f09c1926c096f578aeb4a964dedba27d52497869334d5e310e707c12b0f234
                                                                                                • Opcode Fuzzy Hash: c0ee731de2a7eb3f0a64fa7099e26221a36f7baf9762917c7dc1a7a0b59df7e7
                                                                                                • Instruction Fuzzy Hash: 932131B1A042806BD600F77A980635B7B9497C4314F84043FE90C562E2EEBD59898BAF
                                                                                                APIs
                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 10005CA5
                                                                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 2279764990-746054323
                                                                                                • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                                                                                                • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: : $Se.
                                                                                                • API String ID: 4218353326-4089948878
                                                                                                • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 10002B4F
                                                                                                • ___raise_securityfailure.LIBCMT ref: 10002C36
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                                • String ID: |/Hn/
                                                                                                • API String ID: 3761405300-746054323
                                                                                                • Opcode ID: 70e6b92d4ff8390b97530531c8a31b2bf75f1acffc31a4c733281a71a18183d0
                                                                                                • Instruction ID: 3e738cf41e4fedca429440b27c5ceba6e76d410b83429fe86edfa1b27721cda5
                                                                                                • Opcode Fuzzy Hash: 70e6b92d4ff8390b97530531c8a31b2bf75f1acffc31a4c733281a71a18183d0
                                                                                                • Instruction Fuzzy Hash: 2F21BEB8512361AAF714CF15DED1B44BBE4FB48764F10C02AE9089A3A0E7B0D581CF55
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime
                                                                                                • String ID: | $%02i:%02i:%02i:%03i
                                                                                                • API String ID: 481472006-2430845779
                                                                                                • Opcode ID: 2d916d3c1838c67a0975356691236ea08da2b059c9eba1d7fab34dab80f5395a
                                                                                                • Instruction ID: bea5c42f2d95e84a76b62dfc34e9438b8882b4e2d456746f57979f9b7964cbe7
                                                                                                • Opcode Fuzzy Hash: 2d916d3c1838c67a0975356691236ea08da2b059c9eba1d7fab34dab80f5395a
                                                                                                • Instruction Fuzzy Hash: 0F114C725082405BC704EBA5D8969BF77E8AB94708F10093FF885A31E1EF38DA44C69E
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                  • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                                • String ID: Unknown exception
                                                                                                • API String ID: 3476068407-410509341
                                                                                                • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                APIs
                                                                                                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: String
                                                                                                • String ID: LCMapStringEx$|/Hn/
                                                                                                • API String ID: 2568140703-71175961
                                                                                                • Opcode ID: 7a47d43865ba002eab841ac63f0264426d0741ac74f7406fba362a09800a18bf
                                                                                                • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                                                                                                • Opcode Fuzzy Hash: 7a47d43865ba002eab841ac63f0264426d0741ac74f7406fba362a09800a18bf
                                                                                                • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                                • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                • String ID: Online Keylogger Stopped
                                                                                                • API String ID: 1623830855-1496645233
                                                                                                • Opcode ID: c1d1ebd238a91b1c88e5dd1d29f14cddc457f796cc4b5dcd095f5afc1d0353fc
                                                                                                • Instruction ID: da65c2120251a34d34924486d515db36f90714a8cba0a7d82e96ebed52376b78
                                                                                                • Opcode Fuzzy Hash: c1d1ebd238a91b1c88e5dd1d29f14cddc457f796cc4b5dcd095f5afc1d0353fc
                                                                                                • Instruction Fuzzy Hash: 5901F131A043019BCB25BB35C80B7AEBBB19B45314F40406EE441225D2EB7999A6C3DF
                                                                                                APIs
                                                                                                • waveInPrepareHeader.WINMM(00C455C0,00000020,?,?,00000000,00476B98,00474EE0,?,00000000,00401913), ref: 00401747
                                                                                                • waveInAddBuffer.WINMM(00C455C0,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$BufferHeaderPrepare
                                                                                                • String ID: XMG
                                                                                                • API String ID: 2315374483-813777761
                                                                                                • Opcode ID: ddcf6375f784c1628b927c4ebd910bbcf649a7619fcf77736d7f3a05f195dab6
                                                                                                • Instruction ID: 26799fbdff8c3ec01ad48014b311b0d3f370155dffc0330205344997a7b0d52a
                                                                                                • Opcode Fuzzy Hash: ddcf6375f784c1628b927c4ebd910bbcf649a7619fcf77736d7f3a05f195dab6
                                                                                                • Instruction Fuzzy Hash: 6501AD71300300AFD7209F39ED45A69BBB5EF89315B00413EB808E33A2EB74AC50CB98
                                                                                                APIs
                                                                                                • IsValidLocale.KERNEL32(00000000,z?D,00000000,00000001,?,?,00443F7A,?,?,?,?,00000004), ref: 004479EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocaleValid
                                                                                                • String ID: IsValidLocaleName$z?D
                                                                                                • API String ID: 1901932003-2490211753
                                                                                                • Opcode ID: 030ca6b5b062e3e6eb463140e6e5805cf12db518d0019a9c378278714199a4d0
                                                                                                • Instruction ID: 892bc6e93789200f6c95030ba230210178196c8f1f686432b442ac7872abfc60
                                                                                                • Opcode Fuzzy Hash: 030ca6b5b062e3e6eb463140e6e5805cf12db518d0019a9c378278714199a4d0
                                                                                                • Instruction Fuzzy Hash: 06F0E930645218B7DB186F258C06F5E7B95CB05716F50807BFC047A293DE794E0295DD
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: XMG$XMG
                                                                                                • API String ID: 3519838083-886261599
                                                                                                • Opcode ID: 94d942c2b9cd7cd452367b65107360caec8e392a141153fe325b9bee2a1bda9b
                                                                                                • Instruction ID: 0a877421dfc5135a28098138b17ad9f721677e320a6d1c8a6a2adbe775497da7
                                                                                                • Opcode Fuzzy Hash: 94d942c2b9cd7cd452367b65107360caec8e392a141153fe325b9bee2a1bda9b
                                                                                                • Instruction Fuzzy Hash: D4F0E9B1B00211ABC715BB65880569EB768EF41369F01827FB416772E1CFBD5D04975C
                                                                                                APIs
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 10005F02
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CountCriticalInitializeSectionSpin
                                                                                                • String ID: InitializeCriticalSectionEx$|/Hn/
                                                                                                • API String ID: 2593887523-3648128461
                                                                                                • Opcode ID: 239e2963de0d6cd0752a7905e87955d260eca2173f5729cc2670a532fb8154a9
                                                                                                • Instruction ID: 674605c196627833912876511d98c7499c33f247a669ee446c9f59910835c79f
                                                                                                • Opcode Fuzzy Hash: 239e2963de0d6cd0752a7905e87955d260eca2173f5729cc2670a532fb8154a9
                                                                                                • Instruction Fuzzy Hash: B0F0B43154011CBBFB159F50CC00DEE7F61DB183D1B108025FD0966164CF32AD10AAA4
                                                                                                APIs
                                                                                                • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                                  • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,00475108), ref: 00409B3F
                                                                                                  • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                  • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                  • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                  • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,00475108), ref: 00409B67
                                                                                                  • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047515C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                  • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                • String ID: [AltL]$[AltR]
                                                                                                • API String ID: 2738857842-2658077756
                                                                                                • Opcode ID: 1deea0a1754c58beabcfa893467cad3df36da0ab1922093d88c83ef84dbcd496
                                                                                                • Instruction ID: 4c389cf0edc94a27bb3bc0fddc987b72c0da48b50f0a0a77cbfc03dd010ffeca
                                                                                                • Opcode Fuzzy Hash: 1deea0a1754c58beabcfa893467cad3df36da0ab1922093d88c83ef84dbcd496
                                                                                                • Instruction Fuzzy Hash: 9AE09B2134032117C898323EA91B6EE3A218F82F65B80016FF8427BADADD7D4D5043CF
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Alloc
                                                                                                • String ID: FlsAlloc$|/Hn/
                                                                                                • API String ID: 2773662609-216667041
                                                                                                • Opcode ID: a4c1784f5932adb522d2ca488d7768f2f935f19ba84bde8ccc2372c69ff9f61f
                                                                                                • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                                                                                                • Opcode Fuzzy Hash: a4c1784f5932adb522d2ca488d7768f2f935f19ba84bde8ccc2372c69ff9f61f
                                                                                                • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4575132514.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4575087674.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4575132514.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_10000000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Free
                                                                                                • String ID: FlsFree$|/Hn/
                                                                                                • API String ID: 3978063606-580394536
                                                                                                • Opcode ID: 266330d642cf3eee4d4242d0d615bdc8a312c100e9c677cf1b977f31c441131a
                                                                                                • Instruction ID: b54f93d543b27d774a413c601eeb0e62583d490719bbc6bc30dd5d2f1f1d8414
                                                                                                • Opcode Fuzzy Hash: 266330d642cf3eee4d4242d0d615bdc8a312c100e9c677cf1b977f31c441131a
                                                                                                • Instruction Fuzzy Hash: B8E0E571A00128ABF321EB648C15EEFBBA0CB09BC1B00416AFE0667209CE325D0096E6
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00448A35
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorFreeHeapLast_free
                                                                                                • String ID: 8@$8@
                                                                                                • API String ID: 1353095263-3408345419
                                                                                                • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                • Instruction ID: 8fe4af4b93ebf6b2b13329648f525de20a5552277f2be9521e73d3219e6c2dc0
                                                                                                • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                • Instruction Fuzzy Hash: 01E092361003059F8720CF6DD400A86B7F4EF95720720852FE89EE3710D731E812CB40
                                                                                                APIs
                                                                                                • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: State
                                                                                                • String ID: [CtrlL]$[CtrlR]
                                                                                                • API String ID: 1649606143-2446555240
                                                                                                • Opcode ID: f1664d460506ce6a307028f778898136177a0e582b30a514b3a67480cfc74d29
                                                                                                • Instruction ID: c178b64a75e50e2fccb38c9379e001e6e5e0f6b670105b82eaba8ba361dc1658
                                                                                                • Opcode Fuzzy Hash: f1664d460506ce6a307028f778898136177a0e582b30a514b3a67480cfc74d29
                                                                                                • Instruction Fuzzy Hash: 59E0866170031517C514363DD61B67F39128F41B66F80012FF842A7AC6ED7E8D6423CB
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004752F0,00475308,?,pth_unenc), ref: 00412A60
                                                                                                • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412A70
                                                                                                Strings
                                                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412A5E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteOpenValue
                                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                • API String ID: 2654517830-1051519024
                                                                                                • Opcode ID: 3a238ae8f5602ce2402de7cae663a0db3b4178bc362611f3100633d001d48757
                                                                                                • Instruction ID: 27182704b7fa20b5ed2a2764b3d23dc9a6b68b829b0f6622ee10c7d45645f89b
                                                                                                • Opcode Fuzzy Hash: 3a238ae8f5602ce2402de7cae663a0db3b4178bc362611f3100633d001d48757
                                                                                                • Instruction Fuzzy Hash: F1E01270200308BAEF204FA19E06FEB37ACAB40BC9F004169F601F5191EAB6DD54A658
                                                                                                APIs
                                                                                                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteDirectoryFileRemove
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 3325800564-4028850238
                                                                                                • Opcode ID: dec08f300a5f428fa5c47b7bc45a3e83a5999c060828e280beeb3790875544bf
                                                                                                • Instruction ID: b030a41f26c3d5f2e51690188d4bb45887e11e7cc62b1c698fc8f7347c957287
                                                                                                • Opcode Fuzzy Hash: dec08f300a5f428fa5c47b7bc45a3e83a5999c060828e280beeb3790875544bf
                                                                                                • Instruction Fuzzy Hash: 12E046715116104BC610AB32E845AEBB798AB05306F00446FE8D3B36A1DE38A948CA98
                                                                                                APIs
                                                                                                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                • WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ObjectProcessSingleTerminateWait
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 1872346434-4028850238
                                                                                                • Opcode ID: 5bb4d910bf534706ca5f2b5d32154bdbdc32722f36a2c9cc9993c004b7262cc3
                                                                                                • Instruction ID: eef26e02e81300ba4c8cf7f61278c3f59c29627b67378ac59a4e73c1cb1fd9d7
                                                                                                • Opcode Fuzzy Hash: 5bb4d910bf534706ca5f2b5d32154bdbdc32722f36a2c9cc9993c004b7262cc3
                                                                                                • Instruction Fuzzy Hash: 24D01234145351AFD7610B60AD19F953F68E705323F108365F428512F1CFB58494AA1C
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FD37
                                                                                                • GetLastError.KERNEL32 ref: 0043FD45
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FDA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000002.00000002.4572283515.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000002.00000002.4572283515.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_2_2_400000_plugmancrypted.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1717984340-0
                                                                                                • Opcode ID: da5cee2afb3fc4b5b183086853f31dabd9e5fae04dd03cb90eeff65bb8952867
                                                                                                • Instruction ID: a8021b2984f9c2011c4d4eba480f75da6e6c35d7fa760b83b06315d7a0ea6bca
                                                                                                • Opcode Fuzzy Hash: da5cee2afb3fc4b5b183086853f31dabd9e5fae04dd03cb90eeff65bb8952867
                                                                                                • Instruction Fuzzy Hash: E1410A30E00246AFCF218F65C84867B7BA5EF09310F14517EFC5A9B2A2DB398D05C759

                                                                                                Execution Graph

                                                                                                Execution Coverage:6.3%
                                                                                                Dynamic/Decrypted Code Coverage:9.2%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:2000
                                                                                                Total number of Limit Nodes:77
                                                                                                execution_graph 40353 441819 40356 430737 40353->40356 40355 441825 40357 430756 40356->40357 40369 43076d 40356->40369 40358 430774 40357->40358 40359 43075f 40357->40359 40371 43034a memcpy 40358->40371 40370 4169a7 11 API calls 40359->40370 40362 4307ce 40363 430819 memset 40362->40363 40372 415b2c 11 API calls 40362->40372 40363->40369 40364 43077e 40364->40362 40367 4307fa 40364->40367 40364->40369 40366 4307e9 40366->40363 40366->40369 40373 4169a7 11 API calls 40367->40373 40369->40355 40370->40369 40371->40364 40372->40366 40373->40369 37671 442ec6 19 API calls 37848 4152c6 malloc 37849 4152e2 37848->37849 37850 4152ef 37848->37850 37852 416760 11 API calls 37850->37852 37852->37849 37853 4466f4 37872 446904 37853->37872 37855 446700 GetModuleHandleA 37858 446710 __set_app_type __p__fmode __p__commode 37855->37858 37857 4467a4 37859 4467ac __setusermatherr 37857->37859 37860 4467b8 37857->37860 37858->37857 37859->37860 37873 4468f0 _controlfp 37860->37873 37862 4467bd _initterm __wgetmainargs _initterm 37864 44681e GetStartupInfoW 37862->37864 37865 446810 37862->37865 37866 446866 GetModuleHandleA 37864->37866 37874 41276d 37866->37874 37870 446896 exit 37871 44689d _cexit 37870->37871 37871->37865 37872->37855 37873->37862 37875 41277d 37874->37875 37917 4044a4 LoadLibraryW 37875->37917 37877 412785 37908 412789 37877->37908 37925 414b81 37877->37925 37880 4127c8 37931 412465 memset ??2@YAPAXI 37880->37931 37882 4127ea 37943 40ac21 37882->37943 37887 412813 37961 40dd07 memset 37887->37961 37888 412827 37966 40db69 memset 37888->37966 37892 412822 37987 4125b6 ??3@YAXPAX 37892->37987 37893 40ada2 _wcsicmp 37894 41283d 37893->37894 37894->37892 37897 412863 CoInitialize 37894->37897 37971 41268e 37894->37971 37991 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37897->37991 37901 41296f 37993 40b633 37901->37993 37903 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37909 412957 CoUninitialize 37903->37909 37914 4128ca 37903->37914 37908->37870 37908->37871 37909->37892 37910 4128d0 TranslateAcceleratorW 37911 412941 GetMessageW 37910->37911 37910->37914 37911->37909 37911->37910 37912 412909 IsDialogMessageW 37912->37911 37912->37914 37913 4128fd IsDialogMessageW 37913->37911 37913->37912 37914->37910 37914->37912 37914->37913 37915 41292b TranslateMessage DispatchMessageW 37914->37915 37916 41291f IsDialogMessageW 37914->37916 37915->37911 37916->37911 37916->37915 37918 4044cf GetProcAddress 37917->37918 37921 4044f7 37917->37921 37919 4044e8 FreeLibrary 37918->37919 37922 4044df 37918->37922 37920 4044f3 37919->37920 37919->37921 37920->37921 37923 404507 MessageBoxW 37921->37923 37924 40451e 37921->37924 37922->37919 37923->37877 37924->37877 37926 414b8a 37925->37926 37927 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37925->37927 37997 40a804 memset 37926->37997 37927->37880 37930 414b9e GetProcAddress 37930->37927 37932 4124e0 37931->37932 37933 412505 ??2@YAPAXI 37932->37933 37934 41251c 37933->37934 37936 412521 37933->37936 38019 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37934->38019 38008 444722 37936->38008 37942 41259b wcscpy 37942->37882 38024 40b1ab free free 37943->38024 37947 40a9ce malloc memcpy free free 37954 40ac5c 37947->37954 37948 40ad4b 37956 40ad76 37948->37956 38048 40a9ce 37948->38048 37950 40ace7 free 37950->37954 37954->37947 37954->37948 37954->37950 37954->37956 38028 40a8d0 37954->38028 38040 4099f4 37954->38040 37955 40a8d0 7 API calls 37955->37956 38025 40aa04 37956->38025 37957 40ada2 37958 40adc9 37957->37958 37959 40adaa 37957->37959 37958->37887 37958->37888 37959->37958 37960 40adb3 _wcsicmp 37959->37960 37960->37958 37960->37959 38053 40dce0 37961->38053 37963 40dd3a GetModuleHandleW 38058 40dba7 37963->38058 37967 40dce0 3 API calls 37966->37967 37968 40db99 37967->37968 38130 40dae1 37968->38130 38144 402f3a 37971->38144 37973 412766 37973->37892 37973->37897 37974 4126d3 _wcsicmp 37975 4126a8 37974->37975 37975->37973 37975->37974 37977 41270a 37975->37977 38178 4125f8 7 API calls 37975->38178 37977->37973 38147 411ac5 37977->38147 37988 4125da 37987->37988 37989 4125f0 37988->37989 37990 4125e6 DeleteObject 37988->37990 37992 40b1ab free free 37989->37992 37990->37989 37991->37903 37992->37901 37994 40b640 37993->37994 37995 40b639 free 37993->37995 37996 40b1ab free free 37994->37996 37995->37994 37996->37908 37998 40a83b GetSystemDirectoryW 37997->37998 37999 40a84c wcscpy 37997->37999 37998->37999 38004 409719 wcslen 37999->38004 38002 40a881 LoadLibraryW 38003 40a886 38002->38003 38003->37927 38003->37930 38005 409724 38004->38005 38006 409739 wcscat LoadLibraryW 38004->38006 38005->38006 38007 40972c wcscat 38005->38007 38006->38002 38006->38003 38007->38006 38009 444732 38008->38009 38010 444728 DeleteObject 38008->38010 38020 409cc3 38009->38020 38010->38009 38012 412551 38013 4010f9 38012->38013 38014 401130 38013->38014 38015 401134 GetModuleHandleW LoadIconW 38014->38015 38016 401107 wcsncat 38014->38016 38017 40a7be 38015->38017 38016->38014 38018 40a7d2 38017->38018 38018->37942 38018->38018 38019->37936 38023 409bfd memset wcscpy 38020->38023 38022 409cdb CreateFontIndirectW 38022->38012 38023->38022 38024->37954 38026 40aa14 38025->38026 38027 40aa0a free 38025->38027 38026->37957 38027->38026 38029 40a8eb 38028->38029 38030 40a8df wcslen 38028->38030 38031 40a906 free 38029->38031 38032 40a90f 38029->38032 38030->38029 38033 40a919 38031->38033 38034 4099f4 3 API calls 38032->38034 38035 40a932 38033->38035 38036 40a929 free 38033->38036 38034->38033 38038 4099f4 3 API calls 38035->38038 38037 40a93e memcpy 38036->38037 38037->37954 38039 40a93d 38038->38039 38039->38037 38041 409a41 38040->38041 38042 4099fb malloc 38040->38042 38041->37954 38044 409a37 38042->38044 38045 409a1c 38042->38045 38044->37954 38046 409a30 free 38045->38046 38047 409a20 memcpy 38045->38047 38046->38044 38047->38046 38049 40a9e7 38048->38049 38050 40a9dc free 38048->38050 38052 4099f4 3 API calls 38049->38052 38051 40a9f2 38050->38051 38051->37955 38052->38051 38077 409bca GetModuleFileNameW 38053->38077 38055 40dce6 wcsrchr 38056 40dcf5 38055->38056 38057 40dcf9 wcscat 38055->38057 38056->38057 38057->37963 38078 44db70 38058->38078 38062 40dbfd 38081 4447d9 38062->38081 38065 40dc34 wcscpy wcscpy 38107 40d6f5 38065->38107 38066 40dc1f wcscpy 38066->38065 38069 40d6f5 3 API calls 38070 40dc73 38069->38070 38071 40d6f5 3 API calls 38070->38071 38072 40dc89 38071->38072 38073 40d6f5 3 API calls 38072->38073 38074 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38073->38074 38113 40da80 38074->38113 38077->38055 38079 40dbb4 memset memset 38078->38079 38080 409bca GetModuleFileNameW 38079->38080 38080->38062 38083 4447f4 38081->38083 38082 40dc1b 38082->38065 38082->38066 38083->38082 38084 444807 ??2@YAPAXI 38083->38084 38085 44481f 38084->38085 38086 444873 _snwprintf 38085->38086 38087 4448ab wcscpy 38085->38087 38120 44474a 8 API calls 38086->38120 38089 4448bb 38087->38089 38121 44474a 8 API calls 38089->38121 38090 4448a7 38090->38087 38090->38089 38092 4448cd 38122 44474a 8 API calls 38092->38122 38094 4448e2 38123 44474a 8 API calls 38094->38123 38096 4448f7 38124 44474a 8 API calls 38096->38124 38098 44490c 38125 44474a 8 API calls 38098->38125 38100 444921 38126 44474a 8 API calls 38100->38126 38102 444936 38127 44474a 8 API calls 38102->38127 38104 44494b 38128 44474a 8 API calls 38104->38128 38106 444960 ??3@YAXPAX 38106->38082 38108 44db70 38107->38108 38109 40d702 memset GetPrivateProfileStringW 38108->38109 38110 40d752 38109->38110 38111 40d75c WritePrivateProfileStringW 38109->38111 38110->38111 38112 40d758 38110->38112 38111->38112 38112->38069 38114 44db70 38113->38114 38115 40da8d memset 38114->38115 38116 40daac LoadStringW 38115->38116 38117 40dac6 38116->38117 38117->38116 38119 40dade 38117->38119 38129 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38117->38129 38119->37892 38120->38090 38121->38092 38122->38094 38123->38096 38124->38098 38125->38100 38126->38102 38127->38104 38128->38106 38129->38117 38140 409b98 GetFileAttributesW 38130->38140 38132 40daea 38133 40db63 38132->38133 38134 40daef wcscpy wcscpy GetPrivateProfileIntW 38132->38134 38133->37893 38141 40d65d GetPrivateProfileStringW 38134->38141 38136 40db3e 38142 40d65d GetPrivateProfileStringW 38136->38142 38138 40db4f 38143 40d65d GetPrivateProfileStringW 38138->38143 38140->38132 38141->38136 38142->38138 38143->38133 38179 40eaff 38144->38179 38148 411ae2 memset 38147->38148 38149 411b8f 38147->38149 38219 409bca GetModuleFileNameW 38148->38219 38161 411a8b 38149->38161 38151 411b0a wcsrchr 38152 411b22 wcscat 38151->38152 38153 411b1f 38151->38153 38220 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38152->38220 38153->38152 38155 411b67 38221 402afb 38155->38221 38159 411b7f 38277 40ea13 SendMessageW memset SendMessageW 38159->38277 38162 402afb 27 API calls 38161->38162 38163 411ac0 38162->38163 38164 4110dc 38163->38164 38165 41113e 38164->38165 38170 4110f0 38164->38170 38302 40969c LoadCursorW SetCursor 38165->38302 38167 411143 38303 4032b4 38167->38303 38321 444a54 38167->38321 38168 4110f7 _wcsicmp 38168->38170 38169 411157 38171 40ada2 _wcsicmp 38169->38171 38170->38165 38170->38168 38324 410c46 10 API calls 38170->38324 38174 411167 38171->38174 38172 4111af 38174->38172 38175 4111a6 qsort 38174->38175 38175->38172 38178->37975 38180 40eb10 38179->38180 38192 40e8e0 38180->38192 38183 40eb6c memcpy memcpy 38184 40ebb7 38183->38184 38184->38183 38185 40ebf2 ??2@YAPAXI ??2@YAPAXI 38184->38185 38188 40d134 16 API calls 38184->38188 38186 40ec2e ??2@YAPAXI 38185->38186 38189 40ec65 38185->38189 38186->38189 38188->38184 38189->38189 38202 40ea7f 38189->38202 38191 402f49 38191->37975 38193 40e8f2 38192->38193 38194 40e8eb ??3@YAXPAX 38192->38194 38195 40e900 38193->38195 38196 40e8f9 ??3@YAXPAX 38193->38196 38194->38193 38197 40e911 38195->38197 38198 40e90a ??3@YAXPAX 38195->38198 38196->38195 38199 40e931 ??2@YAPAXI ??2@YAPAXI 38197->38199 38200 40e921 ??3@YAXPAX 38197->38200 38201 40e92a ??3@YAXPAX 38197->38201 38198->38197 38199->38183 38200->38201 38201->38199 38203 40aa04 free 38202->38203 38204 40ea88 38203->38204 38205 40aa04 free 38204->38205 38206 40ea90 38205->38206 38207 40aa04 free 38206->38207 38208 40ea98 38207->38208 38209 40aa04 free 38208->38209 38210 40eaa0 38209->38210 38211 40a9ce 4 API calls 38210->38211 38212 40eab3 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eabd 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eac7 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40ead1 38217->38218 38218->38191 38219->38151 38220->38155 38278 40b2cc 38221->38278 38223 402b0a 38224 40b2cc 27 API calls 38223->38224 38225 402b23 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402b3a 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b54 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b6b 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b82 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b99 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402bb0 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bc7 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bde 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bf5 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c0c 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c23 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c3a 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c51 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c68 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c7f 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c99 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402cb3 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cd5 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cf0 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402d0b 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d26 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d3e 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d59 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d78 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d93 38274->38275 38276 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38275->38276 38276->38159 38277->38149 38281 40b58d 38278->38281 38280 40b2d1 38280->38223 38282 40b5a4 GetModuleHandleW FindResourceW 38281->38282 38283 40b62e 38281->38283 38284 40b5c2 LoadResource 38282->38284 38286 40b5e7 38282->38286 38283->38280 38285 40b5d0 SizeofResource LockResource 38284->38285 38284->38286 38285->38286 38286->38283 38294 40afcf 38286->38294 38288 40b608 memcpy 38297 40b4d3 memcpy 38288->38297 38290 40b61e 38298 40b3c1 18 API calls 38290->38298 38292 40b626 38299 40b04b 38292->38299 38295 40b04b ??3@YAXPAX 38294->38295 38296 40afd7 ??2@YAPAXI 38295->38296 38296->38288 38297->38290 38298->38292 38300 40b051 ??3@YAXPAX 38299->38300 38301 40b05f 38299->38301 38300->38301 38301->38283 38302->38167 38304 4032c4 38303->38304 38305 40b633 free 38304->38305 38306 403316 38305->38306 38325 44553b 38306->38325 38310 403480 38523 40368c 15 API calls 38310->38523 38312 403489 38313 40b633 free 38312->38313 38314 403495 38313->38314 38314->38169 38315 4033a9 memset memcpy 38316 4033ec wcscmp 38315->38316 38317 40333c 38315->38317 38316->38317 38317->38310 38317->38315 38317->38316 38521 4028e7 11 API calls 38317->38521 38522 40f508 6 API calls 38317->38522 38319 403421 _wcsicmp 38319->38317 38322 444a64 FreeLibrary 38321->38322 38323 444a83 38321->38323 38322->38323 38323->38169 38324->38170 38326 445548 38325->38326 38327 445599 38326->38327 38524 40c768 38326->38524 38328 4455a8 memset 38327->38328 38335 4457f2 38327->38335 38607 403988 38328->38607 38339 445854 38335->38339 38709 403e2d memset memset memset memset memset 38335->38709 38336 445672 38618 403fbe memset memset memset memset memset 38336->38618 38337 4458bb memset memset 38344 414c2e 16 API calls 38337->38344 38390 4458aa 38339->38390 38732 403c9c memset memset memset memset memset 38339->38732 38340 44557a 38387 44558c 38340->38387 38804 4136c0 CoTaskMemFree 38340->38804 38342 44595e memset memset 38349 414c2e 16 API calls 38342->38349 38343 4455e5 38343->38336 38352 44560f 38343->38352 38345 4458f9 38344->38345 38350 40b2cc 27 API calls 38345->38350 38347 445a00 memset memset 38755 414c2e 38347->38755 38348 445b22 38354 445bca 38348->38354 38355 445b38 memset memset memset 38348->38355 38359 44599c 38349->38359 38360 445909 38350->38360 38364 4087b3 338 API calls 38352->38364 38353 445849 38820 40b1ab free free 38353->38820 38361 445c8b memset memset 38354->38361 38429 445cf0 38354->38429 38365 445bd4 38355->38365 38366 445b98 38355->38366 38369 40b2cc 27 API calls 38359->38369 38370 409d1f 6 API calls 38360->38370 38373 414c2e 16 API calls 38361->38373 38362 445585 38805 41366b FreeLibrary 38362->38805 38363 44589f 38821 40b1ab free free 38363->38821 38371 445621 38364->38371 38379 414c2e 16 API calls 38365->38379 38366->38365 38375 445ba2 38366->38375 38372 4459ac 38369->38372 38383 445919 38370->38383 38806 4454bf 20 API calls 38371->38806 38385 409d1f 6 API calls 38372->38385 38386 445cc9 38373->38386 38893 4099c6 wcslen 38375->38893 38376 4456b2 38808 40b1ab free free 38376->38808 38378 40b2cc 27 API calls 38391 445a4f 38378->38391 38393 445be2 38379->38393 38380 403335 38520 4452e5 45 API calls 38380->38520 38381 445d3d 38413 40b2cc 27 API calls 38381->38413 38382 445d88 memset memset memset 38396 414c2e 16 API calls 38382->38396 38822 409b98 GetFileAttributesW 38383->38822 38384 445823 38384->38353 38395 4087b3 338 API calls 38384->38395 38397 4459bc 38385->38397 38398 409d1f 6 API calls 38386->38398 38591 444b06 38387->38591 38388 445879 38388->38363 38409 4087b3 338 API calls 38388->38409 38390->38337 38414 44594a 38390->38414 38770 409d1f wcslen wcslen 38391->38770 38402 40b2cc 27 API calls 38393->38402 38395->38384 38406 445dde 38396->38406 38889 409b98 GetFileAttributesW 38397->38889 38408 445ce1 38398->38408 38399 445bb3 38896 445403 memset 38399->38896 38400 445680 38400->38376 38641 4087b3 memset 38400->38641 38403 445bf3 38402->38403 38412 409d1f 6 API calls 38403->38412 38404 445928 38404->38414 38823 40b6ef 38404->38823 38415 40b2cc 27 API calls 38406->38415 38913 409b98 GetFileAttributesW 38408->38913 38409->38388 38423 445c07 38412->38423 38424 445d54 _wcsicmp 38413->38424 38414->38342 38428 4459ed 38414->38428 38427 445def 38415->38427 38416 4459cb 38416->38428 38437 40b6ef 252 API calls 38416->38437 38420 40b2cc 27 API calls 38421 445a94 38420->38421 38775 40ae18 38421->38775 38422 44566d 38422->38335 38692 413d4c 38422->38692 38433 445389 258 API calls 38423->38433 38434 445d71 38424->38434 38499 445d67 38424->38499 38426 445665 38807 40b1ab free free 38426->38807 38435 409d1f 6 API calls 38427->38435 38428->38347 38428->38348 38429->38380 38429->38381 38429->38382 38430 445389 258 API calls 38430->38354 38439 445c17 38433->38439 38914 445093 23 API calls 38434->38914 38442 445e03 38435->38442 38437->38428 38438 4456d8 38444 40b2cc 27 API calls 38438->38444 38445 40b2cc 27 API calls 38439->38445 38441 44563c 38441->38426 38447 4087b3 338 API calls 38441->38447 38915 409b98 GetFileAttributesW 38442->38915 38443 40b6ef 252 API calls 38443->38380 38449 4456e2 38444->38449 38450 445c23 38445->38450 38446 445d83 38446->38380 38447->38441 38809 413fa6 _wcsicmp _wcsicmp 38449->38809 38454 409d1f 6 API calls 38450->38454 38452 445e12 38459 445e6b 38452->38459 38465 40b2cc 27 API calls 38452->38465 38457 445c37 38454->38457 38455 445aa1 38458 445b17 38455->38458 38473 445ab2 memset 38455->38473 38486 409d1f 6 API calls 38455->38486 38782 40add4 38455->38782 38787 445389 38455->38787 38796 40ae51 38455->38796 38456 4456eb 38461 4456fd memset memset memset memset 38456->38461 38462 4457ea 38456->38462 38463 445389 258 API calls 38457->38463 38890 40aebe 38458->38890 38917 445093 23 API calls 38459->38917 38810 409c70 wcscpy wcsrchr 38461->38810 38813 413d29 38462->38813 38468 445c47 38463->38468 38469 445e33 38465->38469 38475 40b2cc 27 API calls 38468->38475 38476 409d1f 6 API calls 38469->38476 38471 445e7e 38472 445f67 38471->38472 38481 40b2cc 27 API calls 38472->38481 38477 40b2cc 27 API calls 38473->38477 38479 445c53 38475->38479 38480 445e47 38476->38480 38477->38455 38478 409c70 2 API calls 38482 44577e 38478->38482 38483 409d1f 6 API calls 38479->38483 38916 409b98 GetFileAttributesW 38480->38916 38485 445f73 38481->38485 38487 409c70 2 API calls 38482->38487 38488 445c67 38483->38488 38490 409d1f 6 API calls 38485->38490 38486->38455 38491 44578d 38487->38491 38492 445389 258 API calls 38488->38492 38489 445e56 38489->38459 38495 445e83 memset 38489->38495 38493 445f87 38490->38493 38491->38462 38498 40b2cc 27 API calls 38491->38498 38492->38354 38920 409b98 GetFileAttributesW 38493->38920 38497 40b2cc 27 API calls 38495->38497 38500 445eab 38497->38500 38501 4457a8 38498->38501 38499->38380 38499->38443 38502 409d1f 6 API calls 38500->38502 38503 409d1f 6 API calls 38501->38503 38504 445ebf 38502->38504 38505 4457b8 38503->38505 38506 40ae18 9 API calls 38504->38506 38812 409b98 GetFileAttributesW 38505->38812 38516 445ef5 38506->38516 38508 4457c7 38508->38462 38510 4087b3 338 API calls 38508->38510 38509 40ae51 9 API calls 38509->38516 38510->38462 38511 445f5c 38513 40aebe FindClose 38511->38513 38512 40add4 2 API calls 38512->38516 38513->38472 38514 40b2cc 27 API calls 38514->38516 38515 409d1f 6 API calls 38515->38516 38516->38509 38516->38511 38516->38512 38516->38514 38516->38515 38518 445f3a 38516->38518 38918 409b98 GetFileAttributesW 38516->38918 38919 445093 23 API calls 38518->38919 38520->38317 38521->38319 38522->38317 38523->38312 38525 40c775 38524->38525 38921 40b1ab free free 38525->38921 38527 40c788 38922 40b1ab free free 38527->38922 38529 40c790 38923 40b1ab free free 38529->38923 38531 40c798 38532 40aa04 free 38531->38532 38533 40c7a0 38532->38533 38924 40c274 memset 38533->38924 38538 40a8ab 9 API calls 38539 40c7c3 38538->38539 38540 40a8ab 9 API calls 38539->38540 38541 40c7d0 38540->38541 38953 40c3c3 38541->38953 38545 40c877 38554 40bdb0 38545->38554 38546 40c86c 38995 4053fe 39 API calls 38546->38995 38548 40c7e5 38548->38545 38548->38546 38553 40c634 49 API calls 38548->38553 38978 40a706 38548->38978 38553->38548 39185 404363 38554->39185 38557 40bf5d 39205 40440c 38557->39205 38559 40bdee 38559->38557 38562 40b2cc 27 API calls 38559->38562 38560 40bddf CredEnumerateW 38560->38559 38563 40be02 wcslen 38562->38563 38563->38557 38565 40be1e 38563->38565 38564 40be26 wcsncmp 38564->38565 38565->38557 38565->38564 38568 40be7d memset 38565->38568 38569 40bea7 memcpy 38565->38569 38570 40bf11 wcschr 38565->38570 38571 40b2cc 27 API calls 38565->38571 38573 40bf43 LocalFree 38565->38573 39208 40bd5d 28 API calls 38565->39208 39209 404423 38565->39209 38568->38565 38568->38569 38569->38565 38569->38570 38570->38565 38572 40bef6 _wcsnicmp 38571->38572 38572->38565 38572->38570 38573->38565 38574 4135f7 39222 4135e0 38574->39222 38577 40b2cc 27 API calls 38578 41360d 38577->38578 38579 40a804 8 API calls 38578->38579 38580 413613 38579->38580 38581 41361b 38580->38581 38582 41363e 38580->38582 38583 40b273 27 API calls 38581->38583 38584 4135e0 FreeLibrary 38582->38584 38585 413625 GetProcAddress 38583->38585 38586 413643 38584->38586 38585->38582 38587 413648 38585->38587 38586->38340 38588 413658 38587->38588 38589 4135e0 FreeLibrary 38587->38589 38588->38340 38590 413666 38589->38590 38590->38340 39225 4449b9 38591->39225 38594 444c1f 38594->38327 38595 4449b9 42 API calls 38597 444b4b 38595->38597 38596 444c15 38598 4449b9 42 API calls 38596->38598 38597->38596 39246 444972 GetVersionExW 38597->39246 38598->38594 38600 444b99 memcmp 38605 444b8c 38600->38605 38601 444c0b 39250 444a85 42 API calls 38601->39250 38605->38600 38605->38601 39247 444aa5 42 API calls 38605->39247 39248 40a7a0 GetVersionExW 38605->39248 39249 444a85 42 API calls 38605->39249 38608 40399d 38607->38608 39251 403a16 38608->39251 38610 403a09 39265 40b1ab free free 38610->39265 38612 4039a3 38612->38610 38616 4039f4 38612->38616 39262 40a02c CreateFileW 38612->39262 38613 403a12 wcsrchr 38613->38343 38616->38610 38617 4099c6 2 API calls 38616->38617 38617->38610 38619 414c2e 16 API calls 38618->38619 38620 404048 38619->38620 38621 414c2e 16 API calls 38620->38621 38622 404056 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 404073 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 40408e 38625->38626 38627 409d1f 6 API calls 38626->38627 38628 4040a6 38627->38628 38629 403af5 20 API calls 38628->38629 38630 4040ba 38629->38630 38631 403af5 20 API calls 38630->38631 38632 4040cb 38631->38632 39292 40414f memset 38632->39292 38634 404140 39306 40b1ab free free 38634->39306 38636 4040ec memset 38639 4040e0 38636->38639 38637 404148 38637->38400 38638 4099c6 2 API calls 38638->38639 38639->38634 38639->38636 38639->38638 38640 40a8ab 9 API calls 38639->38640 38640->38639 39319 40a6e6 WideCharToMultiByte 38641->39319 38643 4087ed 39320 4095d9 memset 38643->39320 38646 408953 38646->38400 38647 408809 memset memset memset memset memset 38648 40b2cc 27 API calls 38647->38648 38649 4088a1 38648->38649 38650 409d1f 6 API calls 38649->38650 38651 4088b1 38650->38651 38652 40b2cc 27 API calls 38651->38652 38653 4088c0 38652->38653 38654 409d1f 6 API calls 38653->38654 38655 4088d0 38654->38655 38656 40b2cc 27 API calls 38655->38656 38657 4088df 38656->38657 38658 409d1f 6 API calls 38657->38658 38659 4088ef 38658->38659 38660 40b2cc 27 API calls 38659->38660 38661 4088fe 38660->38661 38662 409d1f 6 API calls 38661->38662 38663 40890e 38662->38663 38664 40b2cc 27 API calls 38663->38664 38665 40891d 38664->38665 38666 409d1f 6 API calls 38665->38666 38667 40892d 38666->38667 39339 409b98 GetFileAttributesW 38667->39339 38669 40893e 38670 408943 38669->38670 38671 408958 38669->38671 39340 407fdf 75 API calls 38670->39340 39341 409b98 GetFileAttributesW 38671->39341 38674 408964 38675 408969 38674->38675 38676 40897b 38674->38676 38693 40b633 free 38692->38693 38694 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38693->38694 38695 413f00 Process32NextW 38694->38695 38696 413da5 OpenProcess 38695->38696 38697 413f17 CloseHandle 38695->38697 38698 413df3 memset 38696->38698 38703 413eb0 38696->38703 38697->38438 39641 413f27 38698->39641 38700 413ebf free 38700->38703 38701 4099f4 3 API calls 38701->38703 38703->38695 38703->38700 38703->38701 38704 413e37 GetModuleHandleW 38705 413e1f 38704->38705 38706 413e46 GetProcAddress 38704->38706 38705->38704 39646 413959 38705->39646 39662 413ca4 38705->39662 38706->38705 38708 413ea2 CloseHandle 38708->38703 38710 414c2e 16 API calls 38709->38710 38711 403eb7 38710->38711 38712 414c2e 16 API calls 38711->38712 38713 403ec5 38712->38713 38714 409d1f 6 API calls 38713->38714 38715 403ee2 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403efd 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 403f15 38718->38719 38720 403af5 20 API calls 38719->38720 38721 403f29 38720->38721 38722 403af5 20 API calls 38721->38722 38723 403f3a 38722->38723 38724 40414f 33 API calls 38723->38724 38725 403f4f 38724->38725 38726 403faf 38725->38726 38728 403f5b memset 38725->38728 38730 4099c6 2 API calls 38725->38730 38731 40a8ab 9 API calls 38725->38731 39676 40b1ab free free 38726->39676 38728->38725 38729 403fb7 38729->38384 38730->38725 38731->38725 38733 414c2e 16 API calls 38732->38733 38734 403d26 38733->38734 38735 414c2e 16 API calls 38734->38735 38736 403d34 38735->38736 38737 409d1f 6 API calls 38736->38737 38738 403d51 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d6c 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 403d84 38741->38742 38743 403af5 20 API calls 38742->38743 38744 403d98 38743->38744 38745 403af5 20 API calls 38744->38745 38746 403da9 38745->38746 38747 40414f 33 API calls 38746->38747 38748 403dbe 38747->38748 38749 403e1e 38748->38749 38750 403dca memset 38748->38750 38753 4099c6 2 API calls 38748->38753 38754 40a8ab 9 API calls 38748->38754 39677 40b1ab free free 38749->39677 38750->38748 38752 403e26 38752->38388 38753->38748 38754->38748 38756 414b81 9 API calls 38755->38756 38757 414c40 38756->38757 38758 414c73 memset 38757->38758 39678 409cea 38757->39678 38759 414c94 38758->38759 39681 414592 RegOpenKeyExW 38759->39681 38763 414c64 38763->38378 38764 414cc1 38765 414cf4 wcscpy 38764->38765 39682 414bb0 wcscpy 38764->39682 38765->38763 38767 414cd2 39683 4145ac RegQueryValueExW 38767->39683 38769 414ce9 RegCloseKey 38769->38765 38771 409d62 38770->38771 38772 409d43 wcscpy 38770->38772 38771->38420 38773 409719 2 API calls 38772->38773 38774 409d51 wcscat 38773->38774 38774->38771 38776 40aebe FindClose 38775->38776 38777 40ae21 38776->38777 38778 4099c6 2 API calls 38777->38778 38779 40ae35 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40ae49 38780->38781 38781->38455 38783 40ade0 38782->38783 38784 40ae0f 38782->38784 38783->38784 38785 40ade7 wcscmp 38783->38785 38784->38455 38785->38784 38786 40adfe wcscmp 38785->38786 38786->38784 38788 40ae18 9 API calls 38787->38788 38794 4453c4 38788->38794 38789 40ae51 9 API calls 38789->38794 38790 4453f3 38792 40aebe FindClose 38790->38792 38791 40add4 2 API calls 38791->38794 38793 4453fe 38792->38793 38793->38455 38794->38789 38794->38790 38794->38791 38795 445403 253 API calls 38794->38795 38795->38794 38797 40ae7b FindNextFileW 38796->38797 38798 40ae5c FindFirstFileW 38796->38798 38799 40ae94 38797->38799 38800 40ae8f 38797->38800 38798->38799 38802 40aeb6 38799->38802 38803 409d1f 6 API calls 38799->38803 38801 40aebe FindClose 38800->38801 38801->38799 38802->38455 38803->38802 38804->38362 38805->38387 38806->38441 38807->38422 38808->38422 38809->38456 38811 409c89 38810->38811 38811->38478 38812->38508 38814 413d39 38813->38814 38815 413d2f FreeLibrary 38813->38815 38816 40b633 free 38814->38816 38815->38814 38817 413d42 38816->38817 38818 40b633 free 38817->38818 38819 413d4a 38818->38819 38819->38335 38820->38339 38821->38390 38822->38404 38824 44db70 38823->38824 38825 40b6fc memset 38824->38825 38826 409c70 2 API calls 38825->38826 38827 40b732 wcsrchr 38826->38827 38828 40b743 38827->38828 38829 40b746 memset 38827->38829 38828->38829 38830 40b2cc 27 API calls 38829->38830 38831 40b76f 38830->38831 38832 409d1f 6 API calls 38831->38832 38833 40b783 38832->38833 39684 409b98 GetFileAttributesW 38833->39684 38835 40b792 38836 40b7c2 38835->38836 38837 409c70 2 API calls 38835->38837 39685 40bb98 38836->39685 38839 40b7a5 38837->38839 38841 40b2cc 27 API calls 38839->38841 38844 40b7b2 38841->38844 38842 40b837 CloseHandle 38846 40b83e memset 38842->38846 38843 40b817 39719 409a45 GetTempPathW 38843->39719 38848 409d1f 6 API calls 38844->38848 39718 40a6e6 WideCharToMultiByte 38846->39718 38848->38836 38849 40b827 CopyFileW 38849->38846 38850 40b866 38851 444432 121 API calls 38850->38851 38852 40b879 38851->38852 38853 40bad5 38852->38853 38854 40b273 27 API calls 38852->38854 38855 40baeb 38853->38855 38856 40bade DeleteFileW 38853->38856 38857 40b89a 38854->38857 38858 40b04b ??3@YAXPAX 38855->38858 38856->38855 38859 438552 134 API calls 38857->38859 38860 40baf3 38858->38860 38861 40b8a4 38859->38861 38860->38414 38862 40bacd 38861->38862 38864 4251c4 137 API calls 38861->38864 38863 443d90 111 API calls 38862->38863 38863->38853 38887 40b8b8 38864->38887 38865 40bac6 39731 424f26 123 API calls 38865->39731 38866 40b8bd memset 39722 425413 17 API calls 38866->39722 38869 425413 17 API calls 38869->38887 38872 40a71b MultiByteToWideChar 38872->38887 38873 40a734 MultiByteToWideChar 38873->38887 38876 40b9b5 memcmp 38876->38887 38877 4099c6 2 API calls 38877->38887 38878 404423 37 API calls 38878->38887 38880 40bb3e memset memcpy 39732 40a734 MultiByteToWideChar 38880->39732 38881 4251c4 137 API calls 38881->38887 38884 40bb88 LocalFree 38884->38887 38887->38865 38887->38866 38887->38869 38887->38872 38887->38873 38887->38876 38887->38877 38887->38878 38887->38880 38887->38881 38888 40ba5f memcmp 38887->38888 39723 4253ef 16 API calls 38887->39723 39724 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38887->39724 39725 4253af 17 API calls 38887->39725 39726 4253cf 17 API calls 38887->39726 39727 447280 memset 38887->39727 39728 447960 memset memcpy memcpy memcpy 38887->39728 39729 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38887->39729 39730 447920 memcpy memcpy memcpy 38887->39730 38888->38887 38889->38416 38891 40aed1 38890->38891 38892 40aec7 FindClose 38890->38892 38891->38348 38892->38891 38894 4099d7 38893->38894 38895 4099da memcpy 38893->38895 38894->38895 38895->38399 38897 40b2cc 27 API calls 38896->38897 38898 44543f 38897->38898 38899 409d1f 6 API calls 38898->38899 38900 44544f 38899->38900 39824 409b98 GetFileAttributesW 38900->39824 38902 44545e 38903 445476 38902->38903 38904 40b6ef 252 API calls 38902->38904 38905 40b2cc 27 API calls 38903->38905 38904->38903 38906 445482 38905->38906 38907 409d1f 6 API calls 38906->38907 38908 445492 38907->38908 39825 409b98 GetFileAttributesW 38908->39825 38910 4454a1 38911 4454b9 38910->38911 38912 40b6ef 252 API calls 38910->38912 38911->38430 38912->38911 38913->38429 38914->38446 38915->38452 38916->38489 38917->38471 38918->38516 38919->38516 38920->38499 38921->38527 38922->38529 38923->38531 38925 414c2e 16 API calls 38924->38925 38926 40c2ae 38925->38926 38996 40c1d3 38926->38996 38931 40c3be 38948 40a8ab 38931->38948 38932 40afcf 2 API calls 38933 40c2fd FindFirstUrlCacheEntryW 38932->38933 38934 40c3b6 38933->38934 38935 40c31e wcschr 38933->38935 38936 40b04b ??3@YAXPAX 38934->38936 38937 40c331 38935->38937 38938 40c35e FindNextUrlCacheEntryW 38935->38938 38936->38931 38939 40a8ab 9 API calls 38937->38939 38938->38935 38940 40c373 GetLastError 38938->38940 38943 40c33e wcschr 38939->38943 38941 40c3ad FindCloseUrlCache 38940->38941 38942 40c37e 38940->38942 38941->38934 38944 40afcf 2 API calls 38942->38944 38943->38938 38945 40c34f 38943->38945 38946 40c391 FindNextUrlCacheEntryW 38944->38946 38947 40a8ab 9 API calls 38945->38947 38946->38935 38946->38941 38947->38938 39112 40a97a 38948->39112 38951 40a8cc 38951->38538 38952 40a8d0 7 API calls 38952->38951 39117 40b1ab free free 38953->39117 38955 40c3dd 38956 40b2cc 27 API calls 38955->38956 38957 40c3e7 38956->38957 39118 414592 RegOpenKeyExW 38957->39118 38959 40c3f4 38960 40c50e 38959->38960 38961 40c3ff 38959->38961 38975 405337 38960->38975 38962 40a9ce 4 API calls 38961->38962 38963 40c418 memset 38962->38963 39119 40aa1d 38963->39119 38966 40c471 38968 40c47a _wcsupr 38966->38968 38967 40c505 RegCloseKey 38967->38960 38969 40a8d0 7 API calls 38968->38969 38970 40c498 38969->38970 38971 40a8d0 7 API calls 38970->38971 38972 40c4ac memset 38971->38972 38973 40aa1d 38972->38973 38974 40c4e4 RegEnumValueW 38973->38974 38974->38967 38974->38968 39121 405220 38975->39121 38979 4099c6 2 API calls 38978->38979 38980 40a714 _wcslwr 38979->38980 38981 40c634 38980->38981 39178 405361 38981->39178 38984 40c65c wcslen 39181 4053b6 39 API calls 38984->39181 38985 40c71d wcslen 38985->38548 38987 40c713 39184 4053df 39 API calls 38987->39184 38988 40c677 38988->38987 39182 40538b 39 API calls 38988->39182 38991 40c6a5 38991->38987 38992 40c6a9 memset 38991->38992 38993 40c6d3 38992->38993 39183 40c589 43 API calls 38993->39183 38995->38545 38997 40ae18 9 API calls 38996->38997 39003 40c210 38997->39003 38998 40ae51 9 API calls 38998->39003 38999 40c264 39000 40aebe FindClose 38999->39000 39002 40c26f 39000->39002 39001 40add4 2 API calls 39001->39003 39008 40e5ed memset memset 39002->39008 39003->38998 39003->38999 39003->39001 39004 40c231 _wcsicmp 39003->39004 39005 40c1d3 35 API calls 39003->39005 39004->39003 39006 40c248 39004->39006 39005->39003 39021 40c084 22 API calls 39006->39021 39009 414c2e 16 API calls 39008->39009 39010 40e63f 39009->39010 39011 409d1f 6 API calls 39010->39011 39012 40e658 39011->39012 39022 409b98 GetFileAttributesW 39012->39022 39014 40e667 39015 40e680 39014->39015 39017 409d1f 6 API calls 39014->39017 39023 409b98 GetFileAttributesW 39015->39023 39017->39015 39018 40e68f 39019 40c2d8 39018->39019 39024 40e4b2 39018->39024 39019->38931 39019->38932 39021->39003 39022->39014 39023->39018 39045 40e01e 39024->39045 39026 40e593 39028 40e5b0 39026->39028 39029 40e59c DeleteFileW 39026->39029 39027 40e521 39027->39026 39068 40e175 39027->39068 39030 40b04b ??3@YAXPAX 39028->39030 39029->39028 39031 40e5bb 39030->39031 39033 40e5c4 CloseHandle 39031->39033 39034 40e5cc 39031->39034 39033->39034 39036 40b633 free 39034->39036 39035 40e573 39037 40e584 39035->39037 39038 40e57c CloseHandle 39035->39038 39039 40e5db 39036->39039 39111 40b1ab free free 39037->39111 39038->39037 39042 40b633 free 39039->39042 39041 40e540 39041->39035 39088 40e2ab 39041->39088 39043 40e5e3 39042->39043 39043->39019 39046 406214 22 API calls 39045->39046 39047 40e03c 39046->39047 39048 40e16b 39047->39048 39049 40dd85 74 API calls 39047->39049 39048->39027 39050 40e06b 39049->39050 39050->39048 39051 40afcf ??2@YAPAXI ??3@YAXPAX 39050->39051 39052 40e08d OpenProcess 39051->39052 39053 40e0a4 GetCurrentProcess DuplicateHandle 39052->39053 39057 40e152 39052->39057 39054 40e0d0 GetFileSize 39053->39054 39055 40e14a CloseHandle 39053->39055 39058 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39054->39058 39055->39057 39056 40e160 39060 40b04b ??3@YAXPAX 39056->39060 39057->39056 39059 406214 22 API calls 39057->39059 39061 40e0ea 39058->39061 39059->39056 39060->39048 39062 4096dc CreateFileW 39061->39062 39063 40e0f1 CreateFileMappingW 39062->39063 39064 40e140 CloseHandle CloseHandle 39063->39064 39065 40e10b MapViewOfFile 39063->39065 39064->39055 39066 40e13b CloseHandle 39065->39066 39067 40e11f WriteFile UnmapViewOfFile 39065->39067 39066->39064 39067->39066 39069 40e18c 39068->39069 39070 406b90 11 API calls 39069->39070 39071 40e19f 39070->39071 39072 40e1a7 memset 39071->39072 39073 40e299 39071->39073 39078 40e1e8 39072->39078 39074 4069a3 ??3@YAXPAX free 39073->39074 39075 40e2a4 39074->39075 39075->39041 39076 406e8f 13 API calls 39076->39078 39077 406b53 SetFilePointerEx ReadFile 39077->39078 39078->39076 39078->39077 39079 40e283 39078->39079 39080 40dd50 _wcsicmp 39078->39080 39084 40742e 8 API calls 39078->39084 39085 40aae3 wcslen wcslen _memicmp 39078->39085 39086 40e244 _snwprintf 39078->39086 39081 40e291 39079->39081 39082 40e288 free 39079->39082 39080->39078 39083 40aa04 free 39081->39083 39082->39081 39083->39073 39084->39078 39085->39078 39087 40a8d0 7 API calls 39086->39087 39087->39078 39089 40e2c2 39088->39089 39090 406b90 11 API calls 39089->39090 39101 40e2d3 39090->39101 39091 40e4a0 39092 4069a3 ??3@YAXPAX free 39091->39092 39094 40e4ab 39092->39094 39093 406e8f 13 API calls 39093->39101 39094->39041 39095 406b53 SetFilePointerEx ReadFile 39095->39101 39096 40e489 39097 40aa04 free 39096->39097 39098 40e491 39097->39098 39098->39091 39099 40e497 free 39098->39099 39099->39091 39100 40dd50 _wcsicmp 39100->39101 39101->39091 39101->39093 39101->39095 39101->39096 39101->39100 39102 40dd50 _wcsicmp 39101->39102 39105 40742e 8 API calls 39101->39105 39106 40e3e0 memcpy 39101->39106 39107 40e3b3 wcschr 39101->39107 39108 40e3fb memcpy 39101->39108 39109 40e416 memcpy 39101->39109 39110 40e431 memcpy 39101->39110 39103 40e376 memset 39102->39103 39104 40aa29 6 API calls 39103->39104 39104->39101 39105->39101 39106->39101 39107->39101 39108->39101 39109->39101 39110->39101 39111->39026 39114 40a980 39112->39114 39113 40a8bb 39113->38951 39113->38952 39114->39113 39115 40a995 _wcsicmp 39114->39115 39116 40a99c wcscmp 39114->39116 39115->39114 39116->39114 39117->38955 39118->38959 39120 40aa23 RegEnumValueW 39119->39120 39120->38966 39120->38967 39122 405335 39121->39122 39123 40522a 39121->39123 39122->38548 39124 40b2cc 27 API calls 39123->39124 39125 405234 39124->39125 39126 40a804 8 API calls 39125->39126 39127 40523a 39126->39127 39166 40b273 39127->39166 39129 405248 _mbscpy _mbscat GetProcAddress 39130 40b273 27 API calls 39129->39130 39131 405279 39130->39131 39169 405211 GetProcAddress 39131->39169 39133 405282 39134 40b273 27 API calls 39133->39134 39135 40528f 39134->39135 39170 405211 GetProcAddress 39135->39170 39137 405298 39138 40b273 27 API calls 39137->39138 39139 4052a5 39138->39139 39171 405211 GetProcAddress 39139->39171 39141 4052ae 39142 40b273 27 API calls 39141->39142 39143 4052bb 39142->39143 39172 405211 GetProcAddress 39143->39172 39145 4052c4 39146 40b273 27 API calls 39145->39146 39147 4052d1 39146->39147 39173 405211 GetProcAddress 39147->39173 39149 4052da 39150 40b273 27 API calls 39149->39150 39151 4052e7 39150->39151 39174 405211 GetProcAddress 39151->39174 39153 4052f0 39154 40b273 27 API calls 39153->39154 39155 4052fd 39154->39155 39175 405211 GetProcAddress 39155->39175 39157 405306 39158 40b273 27 API calls 39157->39158 39159 405313 39158->39159 39176 405211 GetProcAddress 39159->39176 39161 40531c 39162 40b273 27 API calls 39161->39162 39163 405329 39162->39163 39177 405211 GetProcAddress 39163->39177 39165 405332 39165->39122 39167 40b58d 27 API calls 39166->39167 39168 40b18c 39167->39168 39168->39129 39169->39133 39170->39137 39171->39141 39172->39145 39173->39149 39174->39153 39175->39157 39176->39161 39177->39165 39179 405220 39 API calls 39178->39179 39180 405369 39179->39180 39180->38984 39180->38985 39181->38988 39182->38991 39183->38987 39184->38985 39186 40440c FreeLibrary 39185->39186 39187 40436d 39186->39187 39188 40a804 8 API calls 39187->39188 39189 404377 39188->39189 39190 404383 39189->39190 39191 404405 39189->39191 39192 40b273 27 API calls 39190->39192 39191->38557 39191->38559 39191->38560 39193 40438d GetProcAddress 39192->39193 39194 40b273 27 API calls 39193->39194 39195 4043a7 GetProcAddress 39194->39195 39196 40b273 27 API calls 39195->39196 39197 4043ba GetProcAddress 39196->39197 39198 40b273 27 API calls 39197->39198 39199 4043ce GetProcAddress 39198->39199 39200 40b273 27 API calls 39199->39200 39201 4043e2 GetProcAddress 39200->39201 39202 4043f1 39201->39202 39203 4043f7 39202->39203 39204 40440c FreeLibrary 39202->39204 39203->39191 39204->39191 39206 404413 FreeLibrary 39205->39206 39207 40441e 39205->39207 39206->39207 39207->38574 39208->38565 39210 40442e 39209->39210 39211 40447e 39209->39211 39212 40b2cc 27 API calls 39210->39212 39211->38565 39213 404438 39212->39213 39214 40a804 8 API calls 39213->39214 39215 40443e 39214->39215 39216 404445 39215->39216 39217 404467 39215->39217 39218 40b273 27 API calls 39216->39218 39217->39211 39219 404475 FreeLibrary 39217->39219 39220 40444f GetProcAddress 39218->39220 39219->39211 39220->39217 39221 404460 39220->39221 39221->39217 39223 4135f6 39222->39223 39224 4135eb FreeLibrary 39222->39224 39223->38577 39224->39223 39226 4449c4 39225->39226 39227 444a52 39225->39227 39228 40b2cc 27 API calls 39226->39228 39227->38594 39227->38595 39229 4449cb 39228->39229 39230 40a804 8 API calls 39229->39230 39231 4449d1 39230->39231 39232 40b273 27 API calls 39231->39232 39233 4449dc GetProcAddress 39232->39233 39234 40b273 27 API calls 39233->39234 39235 4449f3 GetProcAddress 39234->39235 39236 40b273 27 API calls 39235->39236 39237 444a04 GetProcAddress 39236->39237 39238 40b273 27 API calls 39237->39238 39239 444a15 GetProcAddress 39238->39239 39240 40b273 27 API calls 39239->39240 39241 444a26 GetProcAddress 39240->39241 39242 40b273 27 API calls 39241->39242 39243 444a37 GetProcAddress 39242->39243 39244 40b273 27 API calls 39243->39244 39245 444a48 GetProcAddress 39244->39245 39245->39227 39246->38605 39247->38605 39248->38605 39249->38605 39250->38596 39252 403a29 39251->39252 39266 403bed memset memset 39252->39266 39254 403ae7 39279 40b1ab free free 39254->39279 39255 403a3f memset 39261 403a2f 39255->39261 39257 403aef 39257->38612 39258 409b98 GetFileAttributesW 39258->39261 39259 40a8d0 7 API calls 39259->39261 39260 409d1f 6 API calls 39260->39261 39261->39254 39261->39255 39261->39258 39261->39259 39261->39260 39263 40a051 GetFileTime CloseHandle 39262->39263 39264 4039ca CompareFileTime 39262->39264 39263->39264 39264->38612 39265->38613 39267 414c2e 16 API calls 39266->39267 39268 403c38 39267->39268 39269 409719 2 API calls 39268->39269 39270 403c3f wcscat 39269->39270 39271 414c2e 16 API calls 39270->39271 39272 403c61 39271->39272 39273 409719 2 API calls 39272->39273 39274 403c68 wcscat 39273->39274 39280 403af5 39274->39280 39277 403af5 20 API calls 39278 403c95 39277->39278 39278->39261 39279->39257 39281 403b02 39280->39281 39282 40ae18 9 API calls 39281->39282 39290 403b37 39282->39290 39283 403bdb 39285 40aebe FindClose 39283->39285 39284 40add4 wcscmp wcscmp 39284->39290 39286 403be6 39285->39286 39286->39277 39287 40ae18 9 API calls 39287->39290 39288 40ae51 9 API calls 39288->39290 39289 40aebe FindClose 39289->39290 39290->39283 39290->39284 39290->39287 39290->39288 39290->39289 39291 40a8d0 7 API calls 39290->39291 39291->39290 39293 409d1f 6 API calls 39292->39293 39294 404190 39293->39294 39307 409b98 GetFileAttributesW 39294->39307 39296 40419c 39297 4041a7 6 API calls 39296->39297 39298 40435c 39296->39298 39300 40424f 39297->39300 39298->38639 39300->39298 39301 40425e memset 39300->39301 39303 409d1f 6 API calls 39300->39303 39304 40a8ab 9 API calls 39300->39304 39308 414842 39300->39308 39301->39300 39302 404296 wcscpy 39301->39302 39302->39300 39303->39300 39305 4042b6 memset memset _snwprintf wcscpy 39304->39305 39305->39300 39306->38637 39307->39296 39311 41443e 39308->39311 39310 414866 39310->39300 39312 41444b 39311->39312 39313 414451 39312->39313 39314 4144a3 GetPrivateProfileStringW 39312->39314 39315 414491 39313->39315 39316 414455 wcschr 39313->39316 39314->39310 39317 414495 WritePrivateProfileStringW 39315->39317 39316->39315 39318 414463 _snwprintf 39316->39318 39317->39310 39318->39317 39319->38643 39321 40b2cc 27 API calls 39320->39321 39322 409615 39321->39322 39323 409d1f 6 API calls 39322->39323 39324 409625 39323->39324 39349 409b98 GetFileAttributesW 39324->39349 39326 409634 39327 409648 39326->39327 39350 4091b8 memset 39326->39350 39329 40b2cc 27 API calls 39327->39329 39331 408801 39327->39331 39330 40965d 39329->39330 39332 409d1f 6 API calls 39330->39332 39331->38646 39331->38647 39333 40966d 39332->39333 39402 409b98 GetFileAttributesW 39333->39402 39335 40967c 39335->39331 39336 409681 39335->39336 39403 409529 72 API calls 39336->39403 39338 409690 39338->39331 39339->38669 39340->38646 39341->38674 39349->39326 39404 40a6e6 WideCharToMultiByte 39350->39404 39352 409202 39405 444432 39352->39405 39355 40b273 27 API calls 39356 409236 39355->39356 39451 438552 39356->39451 39359 409383 39361 40b273 27 API calls 39359->39361 39363 409399 39361->39363 39362 409254 39364 40937b 39362->39364 39472 4253cf 17 API calls 39362->39472 39365 438552 134 API calls 39363->39365 39383 4093a3 39365->39383 39369 4094ff 39480 443d90 39369->39480 39372 4251c4 137 API calls 39372->39383 39374 409507 39382 40951d 39374->39382 39500 408f2f 77 API calls 39374->39500 39376 4093df 39479 424f26 123 API calls 39376->39479 39380 4253cf 17 API calls 39380->39383 39382->39327 39383->39369 39383->39372 39383->39376 39383->39380 39385 4093e4 39383->39385 39477 4253af 17 API calls 39385->39477 39392 4093ed 39478 4253af 17 API calls 39392->39478 39395 4093f9 39395->39376 39402->39335 39403->39338 39404->39352 39501 4438b5 39405->39501 39407 44444c 39413 409215 39407->39413 39515 415a6d 39407->39515 39409 4442e6 11 API calls 39411 44469e 39409->39411 39410 444486 39412 4444b9 memcpy 39410->39412 39450 4444a4 39410->39450 39411->39413 39415 443d90 111 API calls 39411->39415 39519 415258 39412->39519 39413->39355 39413->39382 39415->39413 39416 444524 39417 444541 39416->39417 39418 44452a 39416->39418 39522 444316 39417->39522 39419 416935 16 API calls 39418->39419 39419->39450 39422 444316 18 API calls 39423 444563 39422->39423 39424 444316 18 API calls 39423->39424 39425 44456f 39424->39425 39426 444316 18 API calls 39425->39426 39427 44457f 39426->39427 39427->39450 39536 432d4e 39427->39536 39450->39409 39589 438460 39451->39589 39453 409240 39453->39359 39454 4251c4 39453->39454 39601 424f07 39454->39601 39456 4251e4 39457 4251f7 39456->39457 39458 4251e8 39456->39458 39609 4250f8 39457->39609 39608 4446ea 11 API calls 39458->39608 39460 4251f2 39460->39362 39477->39392 39478->39395 39479->39369 39481 443da3 39480->39481 39482 443db6 39480->39482 39625 41707a 39481->39625 39482->39374 39500->39382 39502 4438d0 39501->39502 39513 4438c9 39501->39513 39503 415378 memcpy memcpy 39502->39503 39504 4438d5 39503->39504 39505 4154e2 10 API calls 39504->39505 39506 443906 39504->39506 39504->39513 39505->39506 39507 443970 memset 39506->39507 39506->39513 39509 44398b 39507->39509 39508 4439a0 39510 415700 10 API calls 39508->39510 39508->39513 39509->39508 39512 41975c 10 API calls 39509->39512 39511 4439c0 39510->39511 39511->39513 39514 418981 10 API calls 39511->39514 39512->39508 39513->39407 39514->39513 39516 415a77 39515->39516 39517 415a8d 39516->39517 39518 415a7e memset 39516->39518 39517->39410 39518->39517 39520 4438b5 11 API calls 39519->39520 39521 41525d 39520->39521 39521->39416 39523 444328 39522->39523 39524 444423 39523->39524 39525 44434e 39523->39525 39526 4446ea 11 API calls 39524->39526 39527 432d4e memset memset memcpy 39525->39527 39533 444381 39526->39533 39528 44435a 39527->39528 39530 444375 39528->39530 39535 44438b 39528->39535 39529 432d4e memset memset memcpy 39531 4443ec 39529->39531 39532 416935 16 API calls 39530->39532 39531->39533 39534 416935 16 API calls 39531->39534 39532->39533 39533->39422 39534->39533 39535->39529 39590 41703f 11 API calls 39589->39590 39591 43847a 39590->39591 39592 43848a 39591->39592 39593 43847e 39591->39593 39595 438270 134 API calls 39592->39595 39594 4446ea 11 API calls 39593->39594 39597 438488 39594->39597 39596 4384aa 39595->39596 39596->39597 39598 424f26 123 API calls 39596->39598 39597->39453 39599 4384bb 39598->39599 39600 438270 134 API calls 39599->39600 39600->39597 39602 424f1f 39601->39602 39603 424f0c 39601->39603 39605 424eea 11 API calls 39602->39605 39604 416760 11 API calls 39603->39604 39606 424f18 39604->39606 39607 424f24 39605->39607 39606->39456 39607->39456 39608->39460 39610 425108 39609->39610 39616 42510d 39609->39616 39611 424f74 124 API calls 39610->39611 39611->39616 39612 42569b 125 API calls 39614 425115 39616->39612 39616->39614 39626 417085 39625->39626 39627 4170ab 39625->39627 39626->39627 39668 413f4f 39641->39668 39644 413f37 K32GetModuleFileNameExW 39645 413f4a 39644->39645 39645->38705 39647 413969 wcscpy 39646->39647 39648 41396c wcschr 39646->39648 39660 413a3a 39647->39660 39648->39647 39650 41398e 39648->39650 39673 4097f7 wcslen wcslen _memicmp 39650->39673 39652 41399a 39653 4139a4 memset 39652->39653 39654 4139e6 39652->39654 39674 409dd5 GetWindowsDirectoryW wcscpy 39653->39674 39656 413a31 wcscpy 39654->39656 39657 4139ec memset 39654->39657 39656->39660 39675 409dd5 GetWindowsDirectoryW wcscpy 39657->39675 39658 4139c9 wcscpy wcscat 39658->39660 39660->38705 39661 413a11 memcpy wcscat 39661->39660 39663 413cb0 GetModuleHandleW 39662->39663 39664 413cda 39662->39664 39663->39664 39665 413cbf GetProcAddress 39663->39665 39666 413ce3 GetProcessTimes 39664->39666 39667 413cf6 39664->39667 39665->39664 39666->38708 39667->38708 39669 413f2f 39668->39669 39670 413f54 39668->39670 39669->39644 39669->39645 39671 40a804 8 API calls 39670->39671 39672 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39671->39672 39672->39669 39673->39652 39674->39658 39675->39661 39676->38729 39677->38752 39679 409cf9 GetVersionExW 39678->39679 39680 409d0a 39678->39680 39679->39680 39680->38758 39680->38763 39681->38764 39682->38767 39683->38769 39684->38835 39686 40bba5 39685->39686 39733 40cc26 39686->39733 39689 40bd4b 39754 40cc0c 39689->39754 39694 40b2cc 27 API calls 39695 40bbef 39694->39695 39761 40ccf0 _wcsicmp 39695->39761 39697 40bbf5 39697->39689 39762 40ccb4 6 API calls 39697->39762 39699 40bc26 39700 40cf04 17 API calls 39699->39700 39701 40bc2e 39700->39701 39702 40bd43 39701->39702 39703 40b2cc 27 API calls 39701->39703 39704 40cc0c 4 API calls 39702->39704 39705 40bc40 39703->39705 39704->39689 39763 40ccf0 _wcsicmp 39705->39763 39707 40bc46 39707->39702 39708 40bc61 memset memset WideCharToMultiByte 39707->39708 39764 40103c strlen 39708->39764 39710 40bcc0 39711 40b273 27 API calls 39710->39711 39712 40bcd0 memcmp 39711->39712 39712->39702 39713 40bce2 39712->39713 39714 404423 37 API calls 39713->39714 39715 40bd10 39714->39715 39715->39702 39716 40bd3a LocalFree 39715->39716 39717 40bd1f memcpy 39715->39717 39716->39702 39717->39716 39718->38850 39720 409a74 GetTempFileNameW 39719->39720 39721 409a66 GetWindowsDirectoryW 39719->39721 39720->38849 39721->39720 39722->38887 39723->38887 39724->38887 39725->38887 39726->38887 39727->38887 39728->38887 39729->38887 39730->38887 39731->38862 39732->38884 39765 4096c3 CreateFileW 39733->39765 39735 40cc34 39736 40cc3d GetFileSize 39735->39736 39744 40bbca 39735->39744 39737 40afcf 2 API calls 39736->39737 39738 40cc64 39737->39738 39766 40a2ef ReadFile 39738->39766 39740 40cc71 39767 40ab4a MultiByteToWideChar 39740->39767 39742 40cc95 CloseHandle 39743 40b04b ??3@YAXPAX 39742->39743 39743->39744 39744->39689 39745 40cf04 39744->39745 39746 40b633 free 39745->39746 39747 40cf14 39746->39747 39773 40b1ab free free 39747->39773 39749 40bbdd 39749->39689 39749->39694 39750 40cf1b 39750->39749 39752 40cfef 39750->39752 39774 40cd4b 39750->39774 39753 40cd4b 14 API calls 39752->39753 39753->39749 39755 40b633 free 39754->39755 39756 40cc15 39755->39756 39757 40aa04 free 39756->39757 39758 40cc1d 39757->39758 39823 40b1ab free free 39758->39823 39760 40b7d4 memset CreateFileW 39760->38842 39760->38843 39761->39697 39762->39699 39763->39707 39764->39710 39765->39735 39766->39740 39768 40ab93 39767->39768 39769 40ab6b 39767->39769 39768->39742 39770 40a9ce 4 API calls 39769->39770 39771 40ab74 39770->39771 39772 40ab7c MultiByteToWideChar 39771->39772 39772->39768 39773->39750 39775 40cd7b 39774->39775 39808 40aa29 39775->39808 39777 40cef5 39778 40aa04 free 39777->39778 39779 40cefd 39778->39779 39779->39750 39781 40aa29 6 API calls 39782 40ce1d 39781->39782 39783 40aa29 6 API calls 39782->39783 39784 40ce3e 39783->39784 39785 40ce6a 39784->39785 39816 40abb7 wcslen memmove 39784->39816 39786 40ce9f 39785->39786 39819 40abb7 wcslen memmove 39785->39819 39788 40a8d0 7 API calls 39786->39788 39791 40ceb5 39788->39791 39789 40ce56 39817 40aa71 wcslen 39789->39817 39797 40a8d0 7 API calls 39791->39797 39793 40ce8b 39820 40aa71 wcslen 39793->39820 39794 40ce5e 39818 40abb7 wcslen memmove 39794->39818 39800 40cecb 39797->39800 39798 40ce93 39821 40abb7 wcslen memmove 39798->39821 39822 40d00b malloc memcpy free free 39800->39822 39802 40cedd 39803 40aa04 free 39802->39803 39804 40cee5 39803->39804 39805 40aa04 free 39804->39805 39806 40ceed 39805->39806 39807 40aa04 free 39806->39807 39807->39777 39809 40aa33 39808->39809 39810 40aa63 39808->39810 39811 40aa44 39809->39811 39812 40aa38 wcslen 39809->39812 39810->39777 39810->39781 39813 40a9ce malloc memcpy free free 39811->39813 39812->39811 39814 40aa4d 39813->39814 39814->39810 39815 40aa51 memcpy 39814->39815 39815->39810 39816->39789 39817->39794 39818->39785 39819->39793 39820->39798 39821->39786 39822->39802 39823->39760 39824->38902 39825->38910 39835 44def7 39836 44df07 39835->39836 39837 44df00 ??3@YAXPAX 39835->39837 39838 44df17 39836->39838 39839 44df10 ??3@YAXPAX 39836->39839 39837->39836 39840 44df27 39838->39840 39841 44df20 ??3@YAXPAX 39838->39841 39839->39838 39842 44df37 39840->39842 39843 44df30 ??3@YAXPAX 39840->39843 39841->39840 39843->39842 37668 44dea5 37669 44deb5 FreeLibrary 37668->37669 37670 44dec3 37668->37670 37669->37670 39844 4148b6 FindResourceW 39845 4148cf SizeofResource 39844->39845 39848 4148f9 39844->39848 39846 4148e0 LoadResource 39845->39846 39845->39848 39847 4148ee LockResource 39846->39847 39846->39848 39847->39848 37847 415304 free 39849 441b3f 39859 43a9f6 39849->39859 39851 441b61 40032 4386af memset 39851->40032 39853 44189a 39854 4418e2 39853->39854 39858 442bd4 39853->39858 39855 4418ea 39854->39855 40033 4414a9 12 API calls 39854->40033 39858->39855 40034 441409 memset 39858->40034 39860 43aa20 39859->39860 39861 43aadf 39859->39861 39860->39861 39862 43aa34 memset 39860->39862 39861->39851 39863 43aa56 39862->39863 39864 43aa4d 39862->39864 40035 43a6e7 39863->40035 40043 42c02e memset 39864->40043 39869 43aad3 40045 4169a7 11 API calls 39869->40045 39870 43aaae 39870->39861 39870->39869 39885 43aae5 39870->39885 39871 43ac18 39874 43ac47 39871->39874 40047 42bbd5 memcpy memcpy memcpy memset memcpy 39871->40047 39875 43aca8 39874->39875 40048 438eed 16 API calls 39874->40048 39878 43acd5 39875->39878 40050 4233ae 11 API calls 39875->40050 40051 423426 11 API calls 39878->40051 39879 43ac87 40049 4233c5 16 API calls 39879->40049 39883 43ace1 40052 439811 163 API calls 39883->40052 39884 43a9f6 161 API calls 39884->39885 39885->39861 39885->39871 39885->39884 40046 439bbb 22 API calls 39885->40046 39887 43acfd 39893 43ad2c 39887->39893 40053 438eed 16 API calls 39887->40053 39889 43ad19 40054 4233c5 16 API calls 39889->40054 39890 43ad58 40055 44081d 163 API calls 39890->40055 39893->39890 39896 43add9 39893->39896 39895 43ae3a memset 39897 43ae73 39895->39897 39896->39896 40059 423426 11 API calls 39896->40059 40060 42e1c0 147 API calls 39897->40060 39898 43adab 40057 438c4e 163 API calls 39898->40057 39901 43ad6c 39901->39861 39901->39898 40056 42370b memset memcpy memset 39901->40056 39902 43adcc 40058 440f84 12 API calls 39902->40058 39903 43ae96 40061 42e1c0 147 API calls 39903->40061 39907 43aea8 39908 43aec1 39907->39908 40062 42e199 147 API calls 39907->40062 39909 43af00 39908->39909 40063 42e1c0 147 API calls 39908->40063 39909->39861 39913 43af1a 39909->39913 39914 43b3d9 39909->39914 40064 438eed 16 API calls 39913->40064 39919 43b3f6 39914->39919 39923 43b4c8 39914->39923 39916 43b60f 39916->39861 40123 4393a5 17 API calls 39916->40123 39917 43af2f 40065 4233c5 16 API calls 39917->40065 40105 432878 12 API calls 39919->40105 39921 43af51 40066 423426 11 API calls 39921->40066 39929 43b4f2 39923->39929 40111 42bbd5 memcpy memcpy memcpy memset memcpy 39923->40111 39925 43af7d 40067 423426 11 API calls 39925->40067 40112 43a76c 21 API calls 39929->40112 39930 43b529 40113 44081d 163 API calls 39930->40113 39931 43b462 40107 423330 11 API calls 39931->40107 39932 43af94 40068 423330 11 API calls 39932->40068 39936 43b47e 39941 43b497 39936->39941 40108 42374a memcpy memset memcpy memcpy memcpy 39936->40108 39937 43b544 39942 43b55c 39937->39942 40114 42c02e memset 39937->40114 39938 43b428 39938->39931 40106 432b60 16 API calls 39938->40106 39939 43afca 40069 423330 11 API calls 39939->40069 40109 4233ae 11 API calls 39941->40109 40115 43a87a 163 API calls 39942->40115 39943 43afdb 40070 4233ae 11 API calls 39943->40070 39949 43b56c 39952 43b58a 39949->39952 40116 423330 11 API calls 39949->40116 39950 43b4b1 40110 423399 11 API calls 39950->40110 39951 43afee 40071 44081d 163 API calls 39951->40071 40117 440f84 12 API calls 39952->40117 39957 43b4c1 40119 42db80 163 API calls 39957->40119 39959 43b592 40118 43a82f 16 API calls 39959->40118 39962 43b5b4 40120 438c4e 163 API calls 39962->40120 39964 43b5cf 40121 42c02e memset 39964->40121 39966 43b005 39966->39861 39970 43b01f 39966->39970 40072 42d836 163 API calls 39966->40072 39967 43b1ef 40082 4233c5 16 API calls 39967->40082 39970->39967 40080 423330 11 API calls 39970->40080 40081 42d71d 163 API calls 39970->40081 39971 43b212 40083 423330 11 API calls 39971->40083 39972 43b087 40073 4233ae 11 API calls 39972->40073 39973 43add4 39973->39916 40122 438f86 16 API calls 39973->40122 39978 43b22a 40084 42ccb5 11 API calls 39978->40084 39980 43b23f 40085 4233ae 11 API calls 39980->40085 39981 43b10f 40076 423330 11 API calls 39981->40076 39983 43b257 40086 4233ae 11 API calls 39983->40086 39987 43b129 40077 4233ae 11 API calls 39987->40077 39988 43b26e 40087 4233ae 11 API calls 39988->40087 39991 43b09a 39991->39981 40074 42cc15 19 API calls 39991->40074 40075 4233ae 11 API calls 39991->40075 39992 43b282 40088 43a87a 163 API calls 39992->40088 39994 43b13c 40078 440f84 12 API calls 39994->40078 39996 43b29d 40089 423330 11 API calls 39996->40089 39999 43b15f 40079 4233ae 11 API calls 39999->40079 40000 43b2af 40002 43b2b8 40000->40002 40003 43b2ce 40000->40003 40090 4233ae 11 API calls 40002->40090 40091 440f84 12 API calls 40003->40091 40006 43b2c9 40093 4233ae 11 API calls 40006->40093 40007 43b2da 40092 42370b memset memcpy memset 40007->40092 40010 43b2f9 40094 423330 11 API calls 40010->40094 40012 43b30b 40095 423330 11 API calls 40012->40095 40014 43b325 40096 423399 11 API calls 40014->40096 40016 43b332 40097 4233ae 11 API calls 40016->40097 40018 43b354 40098 423399 11 API calls 40018->40098 40020 43b364 40099 43a82f 16 API calls 40020->40099 40022 43b370 40100 42db80 163 API calls 40022->40100 40024 43b380 40101 438c4e 163 API calls 40024->40101 40026 43b39e 40102 423399 11 API calls 40026->40102 40028 43b3ae 40103 43a76c 21 API calls 40028->40103 40030 43b3c3 40104 423399 11 API calls 40030->40104 40032->39853 40033->39855 40034->39858 40036 43a6f5 40035->40036 40037 43a765 40035->40037 40036->40037 40124 42a115 40036->40124 40037->39861 40044 4397fd memset 40037->40044 40041 43a73d 40041->40037 40042 42a115 147 API calls 40041->40042 40042->40037 40043->39863 40044->39870 40045->39861 40046->39885 40047->39874 40048->39879 40049->39875 40050->39878 40051->39883 40052->39887 40053->39889 40054->39893 40055->39901 40056->39898 40057->39902 40058->39973 40059->39895 40060->39903 40061->39907 40062->39908 40063->39908 40064->39917 40065->39921 40066->39925 40067->39932 40068->39939 40069->39943 40070->39951 40071->39966 40072->39972 40073->39991 40074->39991 40075->39991 40076->39987 40077->39994 40078->39999 40079->39970 40080->39970 40081->39970 40082->39971 40083->39978 40084->39980 40085->39983 40086->39988 40087->39992 40088->39996 40089->40000 40090->40006 40091->40007 40092->40006 40093->40010 40094->40012 40095->40014 40096->40016 40097->40018 40098->40020 40099->40022 40100->40024 40101->40026 40102->40028 40103->40030 40104->39973 40105->39938 40106->39931 40107->39936 40108->39941 40109->39950 40110->39957 40111->39929 40112->39930 40113->39937 40114->39942 40115->39949 40116->39952 40117->39959 40118->39957 40119->39962 40120->39964 40121->39973 40122->39916 40123->39861 40125 42a175 40124->40125 40127 42a122 40124->40127 40125->40037 40130 42b13b 147 API calls 40125->40130 40127->40125 40128 42a115 147 API calls 40127->40128 40131 43a174 40127->40131 40155 42a0a8 147 API calls 40127->40155 40128->40127 40130->40041 40145 43a196 40131->40145 40146 43a19e 40131->40146 40132 43a306 40132->40145 40175 4388c4 14 API calls 40132->40175 40135 42a115 147 API calls 40135->40146 40137 43a642 40137->40145 40179 4169a7 11 API calls 40137->40179 40141 43a635 40178 42c02e memset 40141->40178 40145->40127 40146->40132 40146->40135 40146->40145 40156 42ff8c 40146->40156 40164 415a91 40146->40164 40168 4165ff 40146->40168 40171 439504 13 API calls 40146->40171 40172 4312d0 147 API calls 40146->40172 40173 42be4c memcpy memcpy memcpy memset memcpy 40146->40173 40174 43a121 11 API calls 40146->40174 40148 4169a7 11 API calls 40149 43a325 40148->40149 40149->40137 40149->40141 40149->40145 40149->40148 40150 42b5b5 memset memcpy 40149->40150 40151 42bf4c 14 API calls 40149->40151 40154 4165ff 11 API calls 40149->40154 40176 42b63e 14 API calls 40149->40176 40177 42bfcf memcpy 40149->40177 40150->40149 40151->40149 40154->40149 40155->40127 40180 43817e 40156->40180 40158 42ff99 40159 42ffe3 40158->40159 40160 42ffd0 40158->40160 40163 42ff9d 40158->40163 40185 4169a7 11 API calls 40159->40185 40184 4169a7 11 API calls 40160->40184 40163->40146 40165 415a9d 40164->40165 40166 415ab3 40165->40166 40167 415aa4 memset 40165->40167 40166->40146 40167->40166 40332 4165a0 40168->40332 40171->40146 40172->40146 40173->40146 40174->40146 40175->40149 40176->40149 40177->40149 40178->40137 40179->40145 40181 438187 40180->40181 40183 438192 40180->40183 40186 4380f6 40181->40186 40183->40158 40184->40163 40185->40163 40188 43811f 40186->40188 40187 438164 40187->40183 40188->40187 40190 4300e8 3 API calls 40188->40190 40191 437e5e 40188->40191 40190->40188 40214 437d3c 40191->40214 40193 437eb3 40193->40188 40194 437ea9 40194->40193 40199 437f22 40194->40199 40229 41f432 40194->40229 40197 437f06 40276 415c56 11 API calls 40197->40276 40201 432d4e 3 API calls 40199->40201 40202 437f7f 40199->40202 40200 437f95 40277 415c56 11 API calls 40200->40277 40201->40202 40202->40200 40203 43802b 40202->40203 40205 4165ff 11 API calls 40203->40205 40206 438054 40205->40206 40240 437371 40206->40240 40209 43806b 40210 438094 40209->40210 40278 42f50e 138 API calls 40209->40278 40212 4300e8 3 API calls 40210->40212 40213 437fa3 40210->40213 40212->40213 40213->40193 40279 41f638 104 API calls 40213->40279 40215 437d69 40214->40215 40218 437d80 40214->40218 40280 437ccb 11 API calls 40215->40280 40217 437d76 40217->40194 40218->40217 40219 437da3 40218->40219 40221 437d90 40218->40221 40222 438460 134 API calls 40219->40222 40221->40217 40284 437ccb 11 API calls 40221->40284 40225 437dcb 40222->40225 40223 437de8 40283 424f26 123 API calls 40223->40283 40225->40223 40281 444283 13 API calls 40225->40281 40227 437dfc 40282 437ccb 11 API calls 40227->40282 40230 41f54d 40229->40230 40236 41f44f 40229->40236 40231 41f466 40230->40231 40314 41c635 memset memset 40230->40314 40231->40197 40231->40199 40236->40231 40238 41f50b 40236->40238 40285 41f1a5 40236->40285 40310 41c06f memcmp 40236->40310 40311 41f3b1 90 API calls 40236->40311 40312 41f398 86 API calls 40236->40312 40238->40230 40238->40231 40313 41c295 86 API calls 40238->40313 40315 41703f 40240->40315 40242 437399 40243 43739d 40242->40243 40245 4373ac 40242->40245 40322 4446ea 11 API calls 40243->40322 40246 416935 16 API calls 40245->40246 40247 4373ca 40246->40247 40248 438460 134 API calls 40247->40248 40253 4251c4 137 API calls 40247->40253 40257 415a91 memset 40247->40257 40260 43758f 40247->40260 40272 437584 40247->40272 40275 437d3c 135 API calls 40247->40275 40323 425433 13 API calls 40247->40323 40324 425413 17 API calls 40247->40324 40325 42533e 16 API calls 40247->40325 40326 42538f 16 API calls 40247->40326 40327 42453e 123 API calls 40247->40327 40248->40247 40249 4375bc 40251 415c7d 16 API calls 40249->40251 40252 4375d2 40251->40252 40254 4442e6 11 API calls 40252->40254 40274 4373a7 40252->40274 40253->40247 40255 4375e2 40254->40255 40255->40274 40330 444283 13 API calls 40255->40330 40257->40247 40328 42453e 123 API calls 40260->40328 40263 4375f4 40266 437620 40263->40266 40267 43760b 40263->40267 40265 43759f 40268 416935 16 API calls 40265->40268 40270 416935 16 API calls 40266->40270 40331 444283 13 API calls 40267->40331 40268->40272 40270->40274 40272->40249 40329 42453e 123 API calls 40272->40329 40273 437612 memcpy 40273->40274 40274->40209 40275->40247 40276->40193 40277->40213 40278->40210 40279->40193 40280->40217 40281->40227 40282->40223 40283->40217 40284->40217 40286 41bc3b 101 API calls 40285->40286 40287 41f1b4 40286->40287 40288 41edad 86 API calls 40287->40288 40295 41f282 40287->40295 40289 41f1cb 40288->40289 40290 41f1f5 memcmp 40289->40290 40291 41f20e 40289->40291 40289->40295 40290->40291 40292 41f21b memcmp 40291->40292 40291->40295 40293 41f326 40292->40293 40296 41f23d 40292->40296 40294 41ee6b 86 API calls 40293->40294 40293->40295 40294->40295 40295->40236 40296->40293 40297 41f28e memcmp 40296->40297 40299 41c8df 56 API calls 40296->40299 40297->40293 40298 41f2a9 40297->40298 40298->40293 40301 41f308 40298->40301 40302 41f2d8 40298->40302 40300 41f269 40299->40300 40300->40293 40303 41f287 40300->40303 40304 41f27a 40300->40304 40301->40293 40308 4446ce 11 API calls 40301->40308 40305 41ee6b 86 API calls 40302->40305 40303->40297 40306 41ee6b 86 API calls 40304->40306 40307 41f2e0 40305->40307 40306->40295 40309 41b1ca memset 40307->40309 40308->40293 40309->40295 40310->40236 40311->40236 40312->40236 40313->40230 40314->40231 40316 417044 40315->40316 40317 41705c 40315->40317 40319 416760 11 API calls 40316->40319 40321 417055 40316->40321 40318 417075 40317->40318 40320 41707a 11 API calls 40317->40320 40318->40242 40319->40321 40320->40316 40321->40242 40322->40274 40323->40247 40324->40247 40325->40247 40326->40247 40327->40247 40328->40265 40329->40249 40330->40263 40331->40273 40337 415cfe 40332->40337 40341 415d23 __aullrem __aulldvrm 40337->40341 40344 41628e 40337->40344 40338 4163ca 40351 416422 11 API calls 40338->40351 40340 416172 memset 40340->40341 40341->40338 40341->40340 40342 416422 10 API calls 40341->40342 40343 415cb9 10 API calls 40341->40343 40341->40344 40342->40341 40343->40341 40345 416520 40344->40345 40346 416527 40345->40346 40350 416574 40345->40350 40347 416544 40346->40347 40346->40350 40352 4156aa 11 API calls 40346->40352 40349 416561 memcpy 40347->40349 40347->40350 40349->40350 40350->40146 40351->40344 40352->40347 40374 41493c EnumResourceNamesW 37672 4287c1 37673 4287d2 37672->37673 37674 429ac1 37672->37674 37675 428818 37673->37675 37676 42881f 37673->37676 37691 425711 37673->37691 37686 425ad6 37674->37686 37742 415c56 11 API calls 37674->37742 37709 42013a 37675->37709 37737 420244 97 API calls 37676->37737 37681 4260dd 37736 424251 120 API calls 37681->37736 37683 4259da 37735 416760 11 API calls 37683->37735 37689 422aeb memset memcpy memcpy 37689->37691 37690 429a4d 37692 429a66 37690->37692 37696 429a9b 37690->37696 37691->37674 37691->37683 37691->37689 37691->37690 37694 4260a1 37691->37694 37705 4259c2 37691->37705 37708 425a38 37691->37708 37725 4227f0 memset memcpy 37691->37725 37726 422b84 15 API calls 37691->37726 37727 422b5d memset memcpy memcpy 37691->37727 37728 422640 13 API calls 37691->37728 37730 4241fc 11 API calls 37691->37730 37731 42413a 90 API calls 37691->37731 37738 415c56 11 API calls 37692->37738 37734 415c56 11 API calls 37694->37734 37697 429a96 37696->37697 37740 416760 11 API calls 37696->37740 37741 424251 120 API calls 37697->37741 37699 429a7a 37739 416760 11 API calls 37699->37739 37705->37686 37729 415c56 11 API calls 37705->37729 37708->37705 37732 422640 13 API calls 37708->37732 37733 4226e0 12 API calls 37708->37733 37710 42014c 37709->37710 37713 420151 37709->37713 37752 41e466 97 API calls 37710->37752 37712 420162 37712->37691 37713->37712 37714 4201b3 37713->37714 37715 420229 37713->37715 37716 4201b8 37714->37716 37717 4201dc 37714->37717 37715->37712 37718 41fd5e 86 API calls 37715->37718 37743 41fbdb 37716->37743 37717->37712 37721 4201ff 37717->37721 37749 41fc4c 37717->37749 37718->37712 37721->37712 37724 42013a 97 API calls 37721->37724 37724->37712 37725->37691 37726->37691 37727->37691 37728->37691 37729->37683 37730->37691 37731->37691 37732->37708 37733->37708 37734->37683 37735->37681 37736->37686 37737->37691 37738->37699 37739->37697 37740->37697 37741->37674 37742->37683 37744 41fbf1 37743->37744 37745 41fbf8 37743->37745 37748 41fc39 37744->37748 37767 4446ce 11 API calls 37744->37767 37757 41ee26 37745->37757 37748->37712 37753 41fd5e 37748->37753 37750 41ee6b 86 API calls 37749->37750 37751 41fc5d 37750->37751 37751->37717 37752->37713 37755 41fd65 37753->37755 37754 41fdab 37754->37712 37755->37754 37756 41fbdb 86 API calls 37755->37756 37756->37755 37758 41ee41 37757->37758 37759 41ee32 37757->37759 37768 41edad 37758->37768 37771 4446ce 11 API calls 37759->37771 37762 41ee3c 37762->37744 37765 41ee58 37765->37762 37773 41ee6b 37765->37773 37767->37748 37777 41be52 37768->37777 37771->37762 37772 41eb85 11 API calls 37772->37765 37774 41ee70 37773->37774 37775 41ee78 37773->37775 37833 41bf99 86 API calls 37774->37833 37775->37762 37778 41be6f 37777->37778 37779 41be5f 37777->37779 37785 41be8c 37778->37785 37798 418c63 37778->37798 37812 4446ce 11 API calls 37779->37812 37781 41be69 37781->37762 37781->37772 37783 41bee7 37783->37781 37816 41a453 86 API calls 37783->37816 37785->37781 37785->37783 37786 41bf3a 37785->37786 37787 41bed1 37785->37787 37815 4446ce 11 API calls 37786->37815 37789 41bef0 37787->37789 37792 41bee2 37787->37792 37789->37783 37790 41bf01 37789->37790 37791 41bf24 memset 37790->37791 37793 41bf14 37790->37793 37813 418a6d memset memcpy memset 37790->37813 37791->37781 37802 41ac13 37792->37802 37814 41a223 memset memcpy memset 37793->37814 37797 41bf20 37797->37791 37801 418c72 37798->37801 37799 418d51 memset memset 37800 418c94 37799->37800 37800->37785 37801->37799 37801->37800 37803 41ac52 37802->37803 37804 41ac3f memset 37802->37804 37807 41ac6a 37803->37807 37817 41dc14 19 API calls 37803->37817 37805 41acd9 37804->37805 37805->37783 37808 41aca1 37807->37808 37818 41519d 37807->37818 37808->37805 37810 41acc0 memset 37808->37810 37811 41accd memcpy 37808->37811 37810->37805 37811->37805 37812->37781 37813->37793 37814->37797 37815->37783 37817->37807 37821 4175ed 37818->37821 37829 417570 SetFilePointer 37821->37829 37824 41760a ReadFile 37825 417637 37824->37825 37826 417627 GetLastError 37824->37826 37827 4151b3 37825->37827 37828 41763e memset 37825->37828 37826->37827 37827->37808 37828->37827 37830 4175b2 37829->37830 37831 41759c GetLastError 37829->37831 37830->37824 37830->37827 37831->37830 37832 4175a8 GetLastError 37831->37832 37832->37830 37833->37775 37834 417bc5 37835 417c61 37834->37835 37840 417bda 37834->37840 37836 417bf6 UnmapViewOfFile CloseHandle 37836->37836 37836->37840 37838 417c2c 37838->37840 37846 41851e 20 API calls 37838->37846 37840->37835 37840->37836 37840->37838 37841 4175b7 37840->37841 37842 4175d6 CloseHandle 37841->37842 37843 4175c8 37842->37843 37844 4175df 37842->37844 37843->37844 37845 4175ce Sleep 37843->37845 37844->37840 37845->37842 37846->37838 39826 4147f3 39829 414561 39826->39829 39828 414813 39830 41456d 39829->39830 39831 41457f GetPrivateProfileIntW 39829->39831 39834 4143f1 memset _itow WritePrivateProfileStringW 39830->39834 39831->39828 39833 41457a 39833->39828 39834->39833

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040DDAD
                                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                  • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                • memset.MSVCRT ref: 0040DF5F
                                                                                                • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                • API String ID: 708747863-3398334509
                                                                                                • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                  • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                  • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                • free.MSVCRT ref: 00418803
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                • String ID:
                                                                                                • API String ID: 1355100292-0
                                                                                                • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstNext
                                                                                                • String ID:
                                                                                                • API String ID: 1690352074-0
                                                                                                • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041898C
                                                                                                • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoSystemmemset
                                                                                                • String ID:
                                                                                                • API String ID: 3558857096-0
                                                                                                • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004455C2
                                                                                                • wcsrchr.MSVCRT ref: 004455DA
                                                                                                • memset.MSVCRT ref: 0044570D
                                                                                                • memset.MSVCRT ref: 00445725
                                                                                                  • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                  • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                  • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                  • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                  • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                  • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                  • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                  • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                • memset.MSVCRT ref: 0044573D
                                                                                                • memset.MSVCRT ref: 00445755
                                                                                                • memset.MSVCRT ref: 004458CB
                                                                                                • memset.MSVCRT ref: 004458E3
                                                                                                • memset.MSVCRT ref: 0044596E
                                                                                                • memset.MSVCRT ref: 00445A10
                                                                                                • memset.MSVCRT ref: 00445A28
                                                                                                • memset.MSVCRT ref: 00445AC6
                                                                                                  • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                  • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                  • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                  • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                  • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                • memset.MSVCRT ref: 00445B52
                                                                                                • memset.MSVCRT ref: 00445B6A
                                                                                                • memset.MSVCRT ref: 00445C9B
                                                                                                • memset.MSVCRT ref: 00445CB3
                                                                                                • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                • memset.MSVCRT ref: 00445B82
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                • memset.MSVCRT ref: 00445986
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                • API String ID: 2263259095-3798722523
                                                                                                • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                  • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                  • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                  • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                                • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                • String ID: $/deleteregkey$/savelangfile
                                                                                                • API String ID: 2744995895-28296030
                                                                                                • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040B71C
                                                                                                  • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                  • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                • wcsrchr.MSVCRT ref: 0040B738
                                                                                                • memset.MSVCRT ref: 0040B756
                                                                                                • memset.MSVCRT ref: 0040B7F5
                                                                                                • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                • memset.MSVCRT ref: 0040B851
                                                                                                • memset.MSVCRT ref: 0040B8CA
                                                                                                • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                • memset.MSVCRT ref: 0040BB53
                                                                                                • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateDeleteHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                                • String ID: chp$v10
                                                                                                • API String ID: 4165125987-2783969131
                                                                                                • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f free 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                                APIs
                                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                • free.MSVCRT ref: 0040E49A
                                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                • memset.MSVCRT ref: 0040E380
                                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                • wcschr.MSVCRT ref: 0040E3B8
                                                                                                • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E407
                                                                                                • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E422
                                                                                                • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E43D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                • API String ID: 3849927982-2252543386
                                                                                                • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004091E2
                                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                • String ID:
                                                                                                • API String ID: 3715365532-3916222277
                                                                                                • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 free 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->638 659->654 660->650 662->641
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                • memset.MSVCRT ref: 00413D7F
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                • memset.MSVCRT ref: 00413E07
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                • free.MSVCRT ref: 00413EC1
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                • API String ID: 1344430650-1740548384
                                                                                                • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                  • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                  • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                  • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                  • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                  • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                • String ID: bhv
                                                                                                • API String ID: 4234240956-2689659898
                                                                                                • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                • API String ID: 2941347001-70141382
                                                                                                • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                                • String ID:
                                                                                                • API String ID: 2827331108-0
                                                                                                • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040C298
                                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                • wcschr.MSVCRT ref: 0040C324
                                                                                                • wcschr.MSVCRT ref: 0040C344
                                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                • GetLastError.KERNEL32 ref: 0040C373
                                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                                • String ID: visited:
                                                                                                • API String ID: 1157525455-1702587658
                                                                                                • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 free 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                                                                                                APIs
                                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                • memset.MSVCRT ref: 0040E1BD
                                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                • free.MSVCRT ref: 0040E28B
                                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                  • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                  • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                • _snwprintf.MSVCRT ref: 0040E257
                                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                • API String ID: 2804212203-2982631422
                                                                                                • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                                • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                                • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                • memset.MSVCRT ref: 0040BC75
                                                                                                • memset.MSVCRT ref: 0040BC8C
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 115830560-3916222277
                                                                                                • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError free 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 free 870->877 871->870 877->855
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                • GetLastError.KERNEL32 ref: 0041847E
                                                                                                • free.MSVCRT ref: 0041848B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile$ErrorLastfree
                                                                                                • String ID: |A
                                                                                                • API String ID: 77810686-1717621600
                                                                                                • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041249C
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                • wcscpy.MSVCRT ref: 004125A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                • String ID: r!A
                                                                                                • API String ID: 2791114272-628097481
                                                                                                • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                  • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                  • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                  • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                  • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                  • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                • _wcslwr.MSVCRT ref: 0040C817
                                                                                                  • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                  • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                • wcslen.MSVCRT ref: 0040C82C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                • API String ID: 2936932814-4196376884
                                                                                                • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                • String ID: BIN
                                                                                                • API String ID: 1668488027-1015027815
                                                                                                • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                APIs
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                • wcslen.MSVCRT ref: 0040BE06
                                                                                                • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                • memset.MSVCRT ref: 0040BE91
                                                                                                • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                • wcschr.MSVCRT ref: 0040BF24
                                                                                                • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                • String ID:
                                                                                                • API String ID: 697348961-0
                                                                                                • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403CBF
                                                                                                • memset.MSVCRT ref: 00403CD4
                                                                                                • memset.MSVCRT ref: 00403CE9
                                                                                                • memset.MSVCRT ref: 00403CFE
                                                                                                • memset.MSVCRT ref: 00403D13
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 00403DDA
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                • String ID: Waterfox$Waterfox\Profiles
                                                                                                • API String ID: 3527940856-11920434
                                                                                                • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403E50
                                                                                                • memset.MSVCRT ref: 00403E65
                                                                                                • memset.MSVCRT ref: 00403E7A
                                                                                                • memset.MSVCRT ref: 00403E8F
                                                                                                • memset.MSVCRT ref: 00403EA4
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 00403F6B
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                • API String ID: 3527940856-2068335096
                                                                                                • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403FE1
                                                                                                • memset.MSVCRT ref: 00403FF6
                                                                                                • memset.MSVCRT ref: 0040400B
                                                                                                • memset.MSVCRT ref: 00404020
                                                                                                • memset.MSVCRT ref: 00404035
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 004040FC
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                • API String ID: 3527940856-3369679110
                                                                                                • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy
                                                                                                • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                • API String ID: 3510742995-2641926074
                                                                                                • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                  • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                  • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                • memset.MSVCRT ref: 004033B7
                                                                                                • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                • wcscmp.MSVCRT ref: 004033FC
                                                                                                • _wcsicmp.MSVCRT ref: 00403439
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                • String ID: $0.@
                                                                                                • API String ID: 2758756878-1896041820
                                                                                                • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 2941347001-0
                                                                                                • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403C09
                                                                                                • memset.MSVCRT ref: 00403C1E
                                                                                                  • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                  • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                • wcscat.MSVCRT ref: 00403C47
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                • wcscat.MSVCRT ref: 00403C70
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcscat$Closewcscpywcslen
                                                                                                • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                • API String ID: 3249829328-1174173950
                                                                                                • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040A824
                                                                                                • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • wcscpy.MSVCRT ref: 0040A854
                                                                                                • wcscat.MSVCRT ref: 0040A86A
                                                                                                • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 669240632-0
                                                                                                • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                APIs
                                                                                                • wcschr.MSVCRT ref: 00414458
                                                                                                • _snwprintf.MSVCRT ref: 0041447D
                                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                • String ID: "%s"
                                                                                                • API String ID: 1343145685-3297466227
                                                                                                • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcProcessTimes
                                                                                                • String ID: GetProcessTimes$kernel32.dll
                                                                                                • API String ID: 1714573020-3385500049
                                                                                                • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004087D6
                                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                  • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                • memset.MSVCRT ref: 00408828
                                                                                                • memset.MSVCRT ref: 00408840
                                                                                                • memset.MSVCRT ref: 00408858
                                                                                                • memset.MSVCRT ref: 00408870
                                                                                                • memset.MSVCRT ref: 00408888
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 2911713577-0
                                                                                                • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID: @ $SQLite format 3
                                                                                                • API String ID: 1475443563-3708268960
                                                                                                • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                APIs
                                                                                                  • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                • memset.MSVCRT ref: 00414C87
                                                                                                • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                • wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                Strings
                                                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressCloseProcVersionmemsetwcscpy
                                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                • API String ID: 2705122986-2036018995
                                                                                                • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmpqsort
                                                                                                • String ID: /nosort$/sort
                                                                                                • API String ID: 1579243037-1578091866
                                                                                                • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040E60F
                                                                                                • memset.MSVCRT ref: 0040E629
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Strings
                                                                                                • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                                • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                • API String ID: 3354267031-2114579845
                                                                                                • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                APIs
                                                                                                • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                                • String ID:
                                                                                                • API String ID: 3473537107-0
                                                                                                • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID:
                                                                                                • API String ID: 613200358-0
                                                                                                • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                APIs
                                                                                                Strings
                                                                                                • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset
                                                                                                • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                • API String ID: 2221118986-1725073988
                                                                                                • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@DeleteObject
                                                                                                • String ID: r!A
                                                                                                • API String ID: 1103273653-628097481
                                                                                                • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1033339047-0
                                                                                                • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                APIs
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$memcmp
                                                                                                • String ID: $$8
                                                                                                • API String ID: 2808797137-435121686
                                                                                                • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                APIs
                                                                                                  • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                  • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                  • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                  • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                  • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                  • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                  • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                  • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                  • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                  • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                  • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                  • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                  • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                  • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                  • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                • String ID:
                                                                                                • API String ID: 1979745280-0
                                                                                                • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                APIs
                                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                • memset.MSVCRT ref: 00403A55
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                • String ID: history.dat$places.sqlite
                                                                                                • API String ID: 2641622041-467022611
                                                                                                • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                APIs
                                                                                                  • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                • GetLastError.KERNEL32 ref: 00417627
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$File$PointerRead
                                                                                                • String ID:
                                                                                                • API String ID: 839530781-0
                                                                                                • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFindFirst
                                                                                                • String ID: *.*$index.dat
                                                                                                • API String ID: 1974802433-2863569691
                                                                                                • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                APIs
                                                                                                • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                • GetLastError.KERNEL32 ref: 004175A2
                                                                                                • GetLastError.KERNEL32 ref: 004175A8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$FilePointer
                                                                                                • String ID:
                                                                                                • API String ID: 1156039329-0
                                                                                                • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleTime
                                                                                                • String ID:
                                                                                                • API String ID: 3397143404-0
                                                                                                • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                • String ID:
                                                                                                • API String ID: 1125800050-0
                                                                                                • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleSleep
                                                                                                • String ID: }A
                                                                                                • API String ID: 252777609-2138825249
                                                                                                • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                APIs
                                                                                                • malloc.MSVCRT ref: 00409A10
                                                                                                • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                • free.MSVCRT ref: 00409A31
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: freemallocmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 3056473165-0
                                                                                                • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: d
                                                                                                • API String ID: 0-2564639436
                                                                                                • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset
                                                                                                • String ID: BINARY
                                                                                                • API String ID: 2221118986-907554435
                                                                                                • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                                                                • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                                                                • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp
                                                                                                • String ID: /stext
                                                                                                • API String ID: 2081463915-3817206916
                                                                                                • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp
                                                                                                • String ID: .#v
                                                                                                • API String ID: 2081463915-507759092
                                                                                                • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                APIs
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 2445788494-0
                                                                                                • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                                • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                                • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 3150196962-0
                                                                                                • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                APIs
                                                                                                Strings
                                                                                                • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: malloc
                                                                                                • String ID: failed to allocate %u bytes of memory
                                                                                                • API String ID: 2803490479-1168259600
                                                                                                • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041BDDF
                                                                                                • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmpmemset
                                                                                                • String ID:
                                                                                                • API String ID: 1065087418-0
                                                                                                • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                APIs
                                                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                  • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                  • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                  • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                • String ID:
                                                                                                • API String ID: 1381354015-0
                                                                                                • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset
                                                                                                • String ID:
                                                                                                • API String ID: 2221118986-0
                                                                                                • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                                • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                                • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                                • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004301AD
                                                                                                • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpymemset
                                                                                                • String ID:
                                                                                                • API String ID: 1297977491-0
                                                                                                • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                                • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                                • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                                • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                APIs
                                                                                                  • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                  • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                  • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                  • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                • String ID:
                                                                                                • API String ID: 2154303073-0
                                                                                                • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                APIs
                                                                                                  • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 3150196962-0
                                                                                                • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$PointerRead
                                                                                                • String ID:
                                                                                                • API String ID: 3154509469-0
                                                                                                • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                APIs
                                                                                                • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                  • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                  • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                  • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                • String ID:
                                                                                                • API String ID: 4232544981-0
                                                                                                • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                APIs
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$FileModuleName
                                                                                                • String ID:
                                                                                                • API String ID: 3859505661-0
                                                                                                • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                APIs
                                                                                                • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileRead
                                                                                                • String ID:
                                                                                                • API String ID: 2738559852-0
                                                                                                • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID:
                                                                                                • API String ID: 613200358-0
                                                                                                • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                APIs
                                                                                                • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnumNamesResource
                                                                                                • String ID:
                                                                                                • API String ID: 3334572018-0
                                                                                                • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                APIs
                                                                                                • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseFind
                                                                                                • String ID:
                                                                                                • API String ID: 1863332320-0
                                                                                                • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Open
                                                                                                • String ID:
                                                                                                • API String ID: 71445658-0
                                                                                                • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                                • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                                • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004095FC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                  • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                  • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                  • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 3655998216-0
                                                                                                • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00445426
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                • String ID:
                                                                                                • API String ID: 1828521557-0
                                                                                                • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                APIs
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                  • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@FilePointermemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 609303285-0
                                                                                                • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                APIs
                                                                                                  • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                • String ID:
                                                                                                • API String ID: 2136311172-0
                                                                                                • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@
                                                                                                • String ID:
                                                                                                • API String ID: 1936579350-0
                                                                                                • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                APIs
                                                                                                • EmptyClipboard.USER32 ref: 004098EC
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                • GetLastError.KERNEL32 ref: 0040995D
                                                                                                • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                • GetLastError.KERNEL32 ref: 00409974
                                                                                                • CloseClipboard.USER32 ref: 0040997D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                • String ID:
                                                                                                • API String ID: 3604893535-0
                                                                                                • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                APIs
                                                                                                • EmptyClipboard.USER32 ref: 00409882
                                                                                                • wcslen.MSVCRT ref: 0040988F
                                                                                                • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                • CloseClipboard.USER32 ref: 004098D7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                • String ID:
                                                                                                • API String ID: 1213725291-0
                                                                                                • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32 ref: 004182D7
                                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                • free.MSVCRT ref: 00418370
                                                                                                  • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                  • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                • String ID: OsError 0x%x (%u)
                                                                                                • API String ID: 2360000266-2664311388
                                                                                                • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                APIs
                                                                                                • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Version
                                                                                                • String ID:
                                                                                                • API String ID: 1889659487-0
                                                                                                • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                APIs
                                                                                                • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                • _wcsicmp.MSVCRT ref: 00402305
                                                                                                • _wcsicmp.MSVCRT ref: 00402333
                                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                • memset.MSVCRT ref: 0040265F
                                                                                                • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                                • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                • API String ID: 577499730-1134094380
                                                                                                • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                                • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                                • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                • String ID: :stringdata$ftp://$http://$https://
                                                                                                • API String ID: 2787044678-1921111777
                                                                                                • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                • GetDC.USER32 ref: 004140E3
                                                                                                • wcslen.MSVCRT ref: 00414123
                                                                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                • _snwprintf.MSVCRT ref: 00414244
                                                                                                • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                • String ID: %s:$EDIT$STATIC
                                                                                                • API String ID: 2080319088-3046471546
                                                                                                • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                APIs
                                                                                                • EndDialog.USER32(?,?), ref: 00413221
                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                • memset.MSVCRT ref: 00413292
                                                                                                • memset.MSVCRT ref: 004132B4
                                                                                                • memset.MSVCRT ref: 004132CD
                                                                                                • memset.MSVCRT ref: 004132E1
                                                                                                • memset.MSVCRT ref: 004132FB
                                                                                                • memset.MSVCRT ref: 00413310
                                                                                                • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                • memset.MSVCRT ref: 004133C0
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                • wcscpy.MSVCRT ref: 0041341F
                                                                                                • _snwprintf.MSVCRT ref: 0041348E
                                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                Strings
                                                                                                • {Unknown}, xrefs: 004132A6
                                                                                                • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                • API String ID: 4111938811-1819279800
                                                                                                • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                • String ID:
                                                                                                • API String ID: 829165378-0
                                                                                                • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                • wcscpy.MSVCRT ref: 004041D6
                                                                                                • wcscpy.MSVCRT ref: 004041E7
                                                                                                • memset.MSVCRT ref: 00404200
                                                                                                • memset.MSVCRT ref: 00404215
                                                                                                • _snwprintf.MSVCRT ref: 0040422F
                                                                                                • wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 0040426E
                                                                                                • memset.MSVCRT ref: 004042CD
                                                                                                • memset.MSVCRT ref: 004042E2
                                                                                                • _snwprintf.MSVCRT ref: 004042FE
                                                                                                • wcscpy.MSVCRT ref: 00404311
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                • API String ID: 2454223109-1580313836
                                                                                                • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                APIs
                                                                                                  • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                  • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                  • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                • API String ID: 4054529287-3175352466
                                                                                                • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$HandleModule
                                                                                                • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                • API String ID: 667068680-2887671607
                                                                                                • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _snwprintf$memset$wcscpy
                                                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                • API String ID: 2000436516-3842416460
                                                                                                • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                APIs
                                                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                  • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                  • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                  • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                • String ID:
                                                                                                • API String ID: 1043902810-0
                                                                                                • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                • _snwprintf.MSVCRT ref: 0044488A
                                                                                                • wcscpy.MSVCRT ref: 004448B4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                • API String ID: 2899246560-1542517562
                                                                                                • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                                • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                                • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                APIs
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                • memset.MSVCRT ref: 004085CF
                                                                                                • memset.MSVCRT ref: 004085F1
                                                                                                • memset.MSVCRT ref: 00408606
                                                                                                • strcmp.MSVCRT ref: 00408645
                                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                • memset.MSVCRT ref: 0040870E
                                                                                                • strcmp.MSVCRT ref: 0040876B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                • String ID: ---
                                                                                                • API String ID: 3437578500-2854292027
                                                                                                • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041087D
                                                                                                • memset.MSVCRT ref: 00410892
                                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                • String ID:
                                                                                                • API String ID: 1010922700-0
                                                                                                • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                APIs
                                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                • malloc.MSVCRT ref: 004186B7
                                                                                                • free.MSVCRT ref: 004186C7
                                                                                                • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                • free.MSVCRT ref: 004186E0
                                                                                                • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                • malloc.MSVCRT ref: 004186FE
                                                                                                • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                • free.MSVCRT ref: 00418716
                                                                                                • free.MSVCRT ref: 0041872A
                                                                                                • free.MSVCRT ref: 00418749
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$FullNamePath$malloc$Version
                                                                                                • String ID: |A
                                                                                                • API String ID: 3356672799-1717621600
                                                                                                • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp
                                                                                                • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                • API String ID: 2081463915-1959339147
                                                                                                • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                • API String ID: 2012295524-70141382
                                                                                                • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$HandleModule
                                                                                                • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                • API String ID: 667068680-3953557276
                                                                                                • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                APIs
                                                                                                • GetDC.USER32(00000000), ref: 004121FF
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                  • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                  • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                  • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 1700100422-0
                                                                                                • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                APIs
                                                                                                • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                • String ID:
                                                                                                • API String ID: 552707033-0
                                                                                                • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                  • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                  • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                • strchr.MSVCRT ref: 0040C140
                                                                                                • strchr.MSVCRT ref: 0040C151
                                                                                                • _strlwr.MSVCRT ref: 0040C15F
                                                                                                • memset.MSVCRT ref: 0040C17A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                • String ID: 4$h
                                                                                                • API String ID: 4066021378-1856150674
                                                                                                • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_snwprintf
                                                                                                • String ID: %%0.%df
                                                                                                • API String ID: 3473751417-763548558
                                                                                                • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                APIs
                                                                                                • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                • GetParent.USER32(?), ref: 00406136
                                                                                                • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                • String ID: A
                                                                                                • API String ID: 2892645895-3554254475
                                                                                                • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                APIs
                                                                                                • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                  • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                  • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                  • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                  • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                • memset.MSVCRT ref: 0040DA23
                                                                                                • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                  • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                • String ID: caption
                                                                                                • API String ID: 973020956-4135340389
                                                                                                • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                APIs
                                                                                                • wcschr.MSVCRT ref: 00413972
                                                                                                • wcscpy.MSVCRT ref: 00413982
                                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                  • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                • wcscpy.MSVCRT ref: 004139D1
                                                                                                • wcscat.MSVCRT ref: 004139DC
                                                                                                • memset.MSVCRT ref: 004139B8
                                                                                                  • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                  • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                • memset.MSVCRT ref: 00413A00
                                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                • wcscat.MSVCRT ref: 00413A27
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                • String ID: \systemroot
                                                                                                • API String ID: 4173585201-1821301763
                                                                                                • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                • String ID: 0$6
                                                                                                • API String ID: 4066108131-3849865405
                                                                                                • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004082EF
                                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                • memset.MSVCRT ref: 00408362
                                                                                                • memset.MSVCRT ref: 00408377
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 290601579-0
                                                                                                • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$wcslen
                                                                                                • String ID:
                                                                                                • API String ID: 3592753638-3916222277
                                                                                                • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040A47B
                                                                                                • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                • wcslen.MSVCRT ref: 0040A4BA
                                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                • wcslen.MSVCRT ref: 0040A4E0
                                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpywcslen$_snwprintfmemset
                                                                                                • String ID: %s (%s)$YV@
                                                                                                • API String ID: 3979103747-598926743
                                                                                                • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                APIs
                                                                                                • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$AddressFreeLoadMessageProc
                                                                                                • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                • API String ID: 2780580303-317687271
                                                                                                • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                                • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                                • wcslen.MSVCRT ref: 0040A6B1
                                                                                                • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                                • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                • String ID: Unknown Error$netmsg.dll
                                                                                                • API String ID: 2767993716-572158859
                                                                                                • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                APIs
                                                                                                Strings
                                                                                                • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                • database %s is already in use, xrefs: 0042F6C5
                                                                                                • database is already attached, xrefs: 0042F721
                                                                                                • out of memory, xrefs: 0042F865
                                                                                                • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                • unable to open database: %s, xrefs: 0042F84E
                                                                                                • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpymemset
                                                                                                • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                • API String ID: 1297977491-2001300268
                                                                                                • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                APIs
                                                                                                • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                • GetLastError.KERNEL32 ref: 004178FB
                                                                                                • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$ErrorLastLockSleepUnlock
                                                                                                • String ID:
                                                                                                • API String ID: 3015003838-0
                                                                                                • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                APIs
                                                                                                • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                • GetLastError.KERNEL32 ref: 0041855C
                                                                                                • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                • GetLastError.KERNEL32 ref: 0041858E
                                                                                                • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                • free.MSVCRT ref: 004185AC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                • String ID:
                                                                                                • API String ID: 2802642348-0
                                                                                                • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                  • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                  • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                • wcslen.MSVCRT ref: 0040D1D3
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                • String ID: strings
                                                                                                • API String ID: 3166385802-3030018805
                                                                                                • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040D8BD
                                                                                                • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                • memset.MSVCRT ref: 0040D906
                                                                                                • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                  • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                  • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                • String ID: sysdatetimepick32
                                                                                                • API String ID: 1028950076-4169760276
                                                                                                • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                • memset.MSVCRT ref: 0041BA3D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$memset
                                                                                                • String ID: -journal$-wal
                                                                                                • API String ID: 438689982-2894717839
                                                                                                • Opcode ID: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                                                                                • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                • Opcode Fuzzy Hash: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                                                                                • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                APIs
                                                                                                • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                • String ID:
                                                                                                • API String ID: 4218492932-0
                                                                                                • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                APIs
                                                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$memset
                                                                                                • String ID: gj
                                                                                                • API String ID: 438689982-4203073231
                                                                                                • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                • String ID: 0$6
                                                                                                • API String ID: 2029023288-3849865405
                                                                                                • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                APIs
                                                                                                  • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                • memset.MSVCRT ref: 00405455
                                                                                                • memset.MSVCRT ref: 0040546C
                                                                                                • memset.MSVCRT ref: 00405483
                                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$memcpy$ErrorLast
                                                                                                • String ID: 6$\
                                                                                                • API String ID: 404372293-1284684873
                                                                                                • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                APIs
                                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                • wcscat.MSVCRT ref: 0040A0E6
                                                                                                • wcscat.MSVCRT ref: 0040A0F5
                                                                                                • wcscpy.MSVCRT ref: 0040A107
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1331804452-0
                                                                                                • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                APIs
                                                                                                  • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                • String ID: advapi32.dll
                                                                                                • API String ID: 2012295524-4050573280
                                                                                                • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                APIs
                                                                                                Strings
                                                                                                • <%s>, xrefs: 004100A6
                                                                                                • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_snwprintf
                                                                                                • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                • API String ID: 3473751417-2880344631
                                                                                                • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscat$_snwprintfmemset
                                                                                                • String ID: %2.2X
                                                                                                • API String ID: 2521778956-791839006
                                                                                                • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _snwprintfwcscpy
                                                                                                • String ID: dialog_%d$general$menu_%d$strings
                                                                                                • API String ID: 999028693-502967061
                                                                                                • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                  • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                  • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                • memset.MSVCRT ref: 0040C439
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                • _wcsupr.MSVCRT ref: 0040C481
                                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                • memset.MSVCRT ref: 0040C4D0
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                • String ID:
                                                                                                • API String ID: 4131475296-0
                                                                                                • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                                • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                                • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004116FF
                                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                  • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                • API String ID: 2618321458-3614832568
                                                                                                • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFilefreememset
                                                                                                • String ID:
                                                                                                • API String ID: 2507021081-0
                                                                                                • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                APIs
                                                                                                • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                • malloc.MSVCRT ref: 00417524
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                • free.MSVCRT ref: 00417544
                                                                                                • free.MSVCRT ref: 00417562
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 4131324427-0
                                                                                                • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                • free.MSVCRT ref: 0041822B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: PathTemp$free
                                                                                                • String ID: %s\etilqs_$etilqs_
                                                                                                • API String ID: 924794160-1420421710
                                                                                                • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                APIs
                                                                                                • wcscpy.MSVCRT ref: 0041477F
                                                                                                • wcscpy.MSVCRT ref: 0041479A
                                                                                                • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscpy$CloseCreateFileHandle
                                                                                                • String ID: General
                                                                                                • API String ID: 999786162-26480598
                                                                                                • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastMessage_snwprintf
                                                                                                • String ID: Error$Error %d: %s
                                                                                                • API String ID: 313946961-1552265934
                                                                                                • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                APIs
                                                                                                Strings
                                                                                                • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy
                                                                                                • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                • API String ID: 3510742995-272990098
                                                                                                • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0044A6EB
                                                                                                • memset.MSVCRT ref: 0044A6FB
                                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpymemset
                                                                                                • String ID: gj
                                                                                                • API String ID: 1297977491-4203073231
                                                                                                • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                APIs
                                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                                • free.MSVCRT ref: 0040E9D3
                                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$free
                                                                                                • String ID:
                                                                                                • API String ID: 2241099983-0
                                                                                                • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                APIs
                                                                                                • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                • malloc.MSVCRT ref: 004174BD
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                • free.MSVCRT ref: 004174E4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 4053608372-0
                                                                                                • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 0040D453
                                                                                                • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Rect$ClientParentPoints
                                                                                                • String ID:
                                                                                                • API String ID: 4247780290-0
                                                                                                • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                APIs
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                • memset.MSVCRT ref: 004450CD
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                  • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                • String ID:
                                                                                                • API String ID: 1471605966-0
                                                                                                • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                APIs
                                                                                                • wcscpy.MSVCRT ref: 0044475F
                                                                                                • wcscat.MSVCRT ref: 0044476E
                                                                                                • wcscat.MSVCRT ref: 0044477F
                                                                                                • wcscat.MSVCRT ref: 0044478E
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                  • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                  • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                • String ID: \StringFileInfo\
                                                                                                • API String ID: 102104167-2245444037
                                                                                                • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID:
                                                                                                • API String ID: 613200358-0
                                                                                                • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004100FB
                                                                                                • memset.MSVCRT ref: 00410112
                                                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                • _snwprintf.MSVCRT ref: 00410141
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                • String ID: </%s>
                                                                                                • API String ID: 3400436232-259020660
                                                                                                • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040D58D
                                                                                                • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                • String ID: caption
                                                                                                • API String ID: 1523050162-4135340389
                                                                                                • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                APIs
                                                                                                  • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                  • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                • String ID: MS Sans Serif
                                                                                                • API String ID: 210187428-168460110
                                                                                                • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 3384217055-0
                                                                                                • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040560C
                                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                  • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                • String ID: *.*$dat$wand.dat
                                                                                                • API String ID: 2618321458-1828844352
                                                                                                • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00412057
                                                                                                  • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                • String ID:
                                                                                                • API String ID: 3550944819-0
                                                                                                • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                APIs
                                                                                                • free.MSVCRT ref: 0040F561
                                                                                                • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$free
                                                                                                • String ID: g4@
                                                                                                • API String ID: 2888793982-2133833424
                                                                                                • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy
                                                                                                • String ID: @
                                                                                                • API String ID: 3510742995-2766056989
                                                                                                • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004144E7
                                                                                                  • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                  • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                • memset.MSVCRT ref: 0041451A
                                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 1127616056-0
                                                                                                • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                APIs
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                • malloc.MSVCRT ref: 00417459
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                                                                                • free.MSVCRT ref: 0041747F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 2605342592-0
                                                                                                • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                • RegisterClassW.USER32(?), ref: 00412428
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2678498856-0
                                                                                                • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040F673
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                                • strlen.MSVCRT ref: 0040F6A2
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                • String ID:
                                                                                                • API String ID: 2754987064-0
                                                                                                • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040F6E2
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                                • strlen.MSVCRT ref: 0040F70D
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                • String ID:
                                                                                                • API String ID: 2754987064-0
                                                                                                • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                APIs
                                                                                                  • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                  • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                  • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                • String ID:
                                                                                                • API String ID: 764393265-0
                                                                                                • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                APIs
                                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$System$File$LocalSpecific
                                                                                                • String ID:
                                                                                                • API String ID: 979780441-0
                                                                                                • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$DialogHandleModuleParam
                                                                                                • String ID:
                                                                                                • API String ID: 1386444988-0
                                                                                                • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                APIs
                                                                                                • wcschr.MSVCRT ref: 0040F79E
                                                                                                • wcschr.MSVCRT ref: 0040F7AC
                                                                                                  • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                  • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcschr$memcpywcslen
                                                                                                • String ID: "
                                                                                                • API String ID: 1983396471-123907689
                                                                                                • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                APIs
                                                                                                • _snwprintf.MSVCRT ref: 0040A398
                                                                                                • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _snwprintfmemcpy
                                                                                                • String ID: %2.2X
                                                                                                • API String ID: 2789212964-323797159
                                                                                                • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: _snwprintf
                                                                                                • String ID: %%-%d.%ds
                                                                                                • API String ID: 3988819677-2008345750
                                                                                                • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040E770
                                                                                                • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSendmemset
                                                                                                • String ID: F^@
                                                                                                • API String ID: 568519121-3652327722
                                                                                                • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: PlacementWindowmemset
                                                                                                • String ID: WinPos
                                                                                                • API String ID: 4036792311-2823255486
                                                                                                • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                • memset.MSVCRT ref: 0042BAAE
                                                                                                • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$memset
                                                                                                • String ID:
                                                                                                • API String ID: 438689982-0
                                                                                                • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$memset
                                                                                                • String ID:
                                                                                                • API String ID: 1860491036-0
                                                                                                • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                APIs
                                                                                                • wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                • free.MSVCRT ref: 0040A908
                                                                                                • free.MSVCRT ref: 0040A92B
                                                                                                • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                                • String ID:
                                                                                                • API String ID: 726966127-0
                                                                                                • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                APIs
                                                                                                • wcslen.MSVCRT ref: 0040B1DE
                                                                                                • free.MSVCRT ref: 0040B201
                                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                • free.MSVCRT ref: 0040B224
                                                                                                • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                                • String ID:
                                                                                                • API String ID: 726966127-0
                                                                                                • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                APIs
                                                                                                • strlen.MSVCRT ref: 0040B0D8
                                                                                                • free.MSVCRT ref: 0040B0FB
                                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                • free.MSVCRT ref: 0040B12C
                                                                                                • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$memcpy$mallocstrlen
                                                                                                • String ID:
                                                                                                • API String ID: 3669619086-0
                                                                                                • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                • malloc.MSVCRT ref: 00417407
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                • free.MSVCRT ref: 00417425
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.2164823393.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_400000_plugmancrypted.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 2605342592-0
                                                                                                • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5